1
Published 2005
Table of Contents: ... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...
View full text
Electronic eBook
2
Published 2012
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...
View full text
Electronic eBook
4
Published 2013
Table of Contents: ...-operative Black Hole Attack in MANET -- IP Address Management in Virtualized Cloud Environments -- A Fuzzy C...
View full text
Electronic eBook