1
Published 2014
Table of Contents: ... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...
View full text
Electronic eBook
2
Published 2014
Table of Contents: ... Multiplication for Video Encryption -- Steganography based Secure Communication -- Hierarchy of Communities...
View full text
Electronic eBook