1
Publicado 2015
Table of Contents: ... using a Graph based Approach to Implicitly Find Influential Users -- Ensuring Data Security...
Ligazón do recurso
Electrónico eBook
2
Publicado 2015
Table of Contents: ...A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks...
Ligazón do recurso
Electrónico eBook
3
Publicado 2006
Table of Contents: ... of Digital Images in Arbitrary Dimensions -- JPEG2000 Steganography Possibly Secure Against Histogram-Based...
Ligazón do recurso
Electrónico eBook
4
Publicado 2007
Table of Contents: ... Spatial Data Sets -- Development of an Efficient Conversion System for GML Documents -- Effective Spatial...
Ligazón do recurso
Electrónico eBook
5
Publicado 2014
Table of Contents: ... Reconfigurable Coprocessor for Next Generation Communication Platform -- Secret Code Authentication Using...
Ligazón do recurso
Electrónico eBook
6
Publicado 2010
Table of Contents: ... of the Internet Protocol Security and Its Impact on Interactive Communications -- Investigating Software...
Ligazón do recurso
Electrónico eBook
7
Publicado 2014
Table of Contents: ... Classification -- “A Safer Cloud”, Data Isolation and Security by Tus-Man Protocol -- Poem Classification Using...
Ligazón do recurso
Electrónico eBook