To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10600

Title

Two-stage image denoising by Principal Component Analysis with Self Similarity pixel Strategy

Author

K. John Peter, K. Senthamarai Kannan, S. Arumugan, G.Nagarajan

Citation

Vol. 11  No. 5  pp. 296-300

Keywords

Demosaicking, Gradient, Mosaic Image, Local Similarities, Mosaic, CFA


Title

A New EAP Authentication Method for IEEE 802.11 Wireless

Author

Younes El Hajjaji El Idrissi, Noureddine Zahid, Mohamed Jedra

Citation

Vol. 11  No. 6  pp. 1-11

Keywords

Wireless network, security protocol, Access control, EAP, HPSL


Title

A Novel E-cash Payment Protocol Using Trapdoor Hash Function on Smart Mobile Devices

Author

Jian-Sen Wang, Fuw-Yi Yang, Incheon Paik

Citation

Vol. 11  No. 6  pp. 12-19

Keywords

Electronic commerce, E-cash, Trapdoor hash function, Smart mobile devices


Title

Critical Infrastructure Cyber Threat ? A Case Study

Author

Y Wangdi, D Veal, S P Maj

Citation

Vol. 11  No. 6  pp. 20-23

Keywords

Critical infrastructure, cyber threats, network security


[1] ... [prev] [751] [752] [753] [754] [755] [756] [757] [758] [759] [760] [next] ... [2650]