To search, Click below search items.
All Published Papers Search Service
Title
Exploiting Omega Networks to Hide Text-in-Text Messages
Author
Ala Hamarsheh
Vol. 15 No. 5 pp. 39-43
Keywords
Steganography, watermarking, encryption, secret message, cover message, secret key.
An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks
K.VinothKumar, A.Rajaram
Vol. 14 No. 12 pp. 66-73
Privacy aware routing, active and passive attacks, integrity, non-repudiation, secret key
Visual Cryptography Scheme for Secret Image Retrieval
M. Sukumar Reddy, S. Murali Mohan
Vol. 14 No. 6 pp. 41-46
Visual Cryptography(VC), Random Grids(RGs), Secret Sharing , Contrast
A Modified Adaptive Space-Sharing Policy for Non-dedicated Heterogeneous Cluster Systems
Amit Chhabra, Gurvinder Singh
Vol. 13 No. 11 pp. 63-69
Adaptive space-sharing scheduling, Cluster computing systems, Non-dedicated heterogeneous clusters, and Mean response time