Vol 3, No 2 (2015)

Table of Contents

Vol 3, No 2 (2015)

Open Access Open Access  Restricted Access Subscription Access

Articles

Secure Watermarking using Diophantine Equations for Authentication and Recovery
Jayashree Nair, T. Padma
 Vol 3, No 2 (2015), Pagination: 1-9
ABSTRACT |  PDF     Abstract Views: 231  |  PDF Views: 0
Application of Quaternion Numbers in Identification Scheme
Reza Alimoradi
 Vol 3, No 2 (2015), Pagination: 17-20
ABSTRACT |  PDF     Abstract Views: 241  |  PDF Views: 0
Mitigating Virtual Machine Denial of Service Attacks from Mobile APPS
Dennis Guster, Abdul Raqeeb, Erich Rice
 Vol 3, No 2 (2015), Pagination: 21-31
ABSTRACT |  PDF     Abstract Views: 197  |  PDF Views: 0
Restricted Constraints in the Problem of Maximum Attainable Flow in Minimum Cost in a Network
Nazimuddin Ahmed, Shobha Duttadeka
 Vol 3, No 2 (2015), Pagination: 32-50
ABSTRACT |  PDF     Abstract Views: 209  |  PDF Views: 0