Vol 3, No 2 (2015)

Table of Contents

Vol 3, No 2 (2015)

Open Access Open Access  Restricted Access Subscription Access

Articles

Secure Watermarking using Diophantine Equations for Authentication and Recovery
Jayashree Nair, T. Padma
 Vol 3, No 2 (2015), Pagination: 1-9
ABSTRACT |  PDF     Abstract Views: 287  |  PDF Views: 0
Application of Quaternion Numbers in Identification Scheme
Reza Alimoradi
 Vol 3, No 2 (2015), Pagination: 17-20
ABSTRACT |  PDF     Abstract Views: 295  |  PDF Views: 0
Mitigating Virtual Machine Denial of Service Attacks from Mobile APPS
Dennis Guster, Abdul Raqeeb, Erich Rice
 Vol 3, No 2 (2015), Pagination: 21-31
ABSTRACT |  PDF     Abstract Views: 259  |  PDF Views: 0
Restricted Constraints in the Problem of Maximum Attainable Flow in Minimum Cost in a Network
Nazimuddin Ahmed, Shobha Duttadeka
 Vol 3, No 2 (2015), Pagination: 32-50
ABSTRACT |  PDF     Abstract Views: 264  |  PDF Views: 0