1
Published 2015
Table of Contents: ... using a Graph based Approach to Implicitly Find Influential Users -- Ensuring Data Security...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ...A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks...
View full text
Electronic eBook
3
Published 2013
Table of Contents: ... Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... Mechanisms for Peer-to-Peer Systems -- A Taxonomy of Incentive Patterns -- Search and Systems -- P2P MetaData...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... for WiMAX MBS Security -- A Watermarking Algorithm for JPEG File -- SNR Scalability in H.264/AVC Using Data...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Communication for Highway Safety -- Data Compression on Embedded System -- A Survey on Preserving Privacy...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... System -- Ants in text documents clustering -- Optimal Control in a Monetary Union: An Application...
View full text
Electronic eBook
8
Published 2014
Table of Contents: ... Enhanced Visual Cryptography -- A Data Acquisition (DAQ) Architecture for FPGA Implementation -- Finite...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ...-Commerce: A New Dimension towards Growth for Micro, Small & Medium Scale Enterprises in India -- A New...
View full text
Electronic eBook