To search, Click below search items.
All Published Papers Search Service
Title
Biometric Database Protection using Public Key Cryptography
Author
M.ManiRoja, Sudhir Sawarkar
Vol. 13 No. 5 pp. 20-28
Keywords
Image encryption, Image cryptosystem, Biometric attacks, Database encryption
An Identifier / Locator Split Architecture for Multi-homing and Mobility Support
Joonsuk KANG, Koji OKAMURA
Vol. 13 No. 5 pp. 13-19
Future Internet, naming and addressing, ID/Locator split, multi-homing, mobility
The Technology Acceptance Model for Playing Console Game in Korea
Gabjo Kim, Dohan Choe, Joonhyuk Lee, Sangsung Park, Sunghae Jun, Dongsik Jang
Vol. 13 No. 5 pp. 9-12
TAM, Technology Acceptance Model, Console Game, Survey
Improving The Optimal Solution Attainment Rate by Multiplexing Method
Yasuki Iizuka
Vol. 13 No. 5 pp. 1-8
Distributed Constraint Optimization Problem, Optimal Solution