To search, Click below search items.
All Published Papers Search Service
Title
Secure Authentication Watermarking in Ad-hoc Destination-Sequenced Distance-Vector Routing Protocol
Author
Mehemed Bashir Aliwa
Vol. 14 No. 5 pp. 26-37
Keywords
Mobile ad-hoc network, attacks, secure routing protocol, digital watermarking, ns-2 simulator and metrics
Automatic Brain Tumor Detection in MR Images Using Neural Network Based Classification
C.Ramalakshmi, A.Jaya Chandran
Vol. 14 No. 5 pp. 38-41
Fuzzy Connectedness Segmentation, Support Vector Machine (SVM), Connected Component labeling, Discrete Wavelet Transform (DWT)
Ensuring Data Privacy and Access Anonymity using Cryptographic Techniques in Cloud Computing
Lamminthang Singsit, Marie Stanislas Ashok
Vol. 14 No. 5 pp. 42-47
Cloud computing, Outsourced Data, Data Security and Privacy, , confidentiality, Access Control
Content Based Retrieval System with Bloom in An Unstructured P2p Overlay Networks
P.S.THUMILVANNAN, S.UVARAJ
Vol. 14 No. 5 pp. 48-52
Bloom Cast, Bloom Filters, Self-Certification, Self-Configuring Networks, Unstructured P2P network