To search, Click below search items.
All Published Papers Search Service
Title
Security Analysis of Access Linux Platform
Author
Andreas Sj?str?m, Kazuhide Fukushima, Shinsaku Kiyomoto, Wook Shin, Toshiaki Tanaka
Vol. 10 No. 5 pp. 12-18
Keywords
Access Linux, Security, Open Platform, Mobile, Vulnerability
An Overview of Alagappa University Delay Tolerant Water Monitoring Network
Laveen Sundararaj, Palanisamy Vellaiyan
Vol. 10 No. 5 pp. 19-28
DTN - Delay and Disruption Tolerant Networking, IPN ? Inter Planetary Internet, AUDTWMN- Alagappa University Delay Tolerant Water Monitoring Network, Alunivdtnsim ? Alagappa University Delay Tolerant Network Simulator, LTP ? Lick Lider Transmission Protoc
An Efficient Off-line Signature Identification Method Based On Fourier Descriptor and Chain Codes
Ismail A. Ismail, Mohamed A. Ramadan, Talaat S. El-Danaf, Ahmed H. Samak
Vol. 10 No. 5 pp. 29-35
signature recognition, Fourier Descriptor, Principle Component Analysis, personal verification
Developing File Security for Windows Operation System
Seung-Ju Jang
Vol. 10 No. 5 pp. 36-39
Windows O.S, security, directory access control, file encryption, file decryption