To search, Click below search items.
All Published Papers Search Service
Title
Effective Variations on Opened GIF Format Images
Author
Hamza A. Ali, Bashar M. Ne¡¯ma
Vol. 8 No. 5 pp. 70-75
Keywords
GIF format, Image Header, Image processing, LZW, Compression, Software Engineering Tools, and Security
Secure Mechanism for Credit/Debit Card Transaction Fraud Detection by using Fingerprint Authentication System
Priyanka A. Jamdar, Supriya K. Bendale, Deepali A. Durgawale
Vol. 16 No. 3 pp. 35-38
Credit/Debit card fraud detection and Security, Threshold transaction, fingerprint biometric authentication.
Empirical Study of NDTAODV, SAODV and AODV Routing Protocol in the presence of RREQ Flood Attacks in MANETs
Nirbhay Kumar Chaubey and Lal Bihari Barik
Vol. 17 No. 11 pp. 90-95
MANET, NDTAODV, SAODV, AODV, Flood Attacks, algorithm and Security.
Review Of Some Cryptographic Algorithms In Cloud Computing
Mawaddah Fouad Alharbi¢Ó, , Fahd Aldosari , Nawaf Fouad Alharbi
Vol. 21 No. 9 pp. 41-50
Cloud Computing, Cryptography, Symmetric Algorithms, Asymmetric Algorithms , Hybrid Encryption, Cloud Storage, and Security.