Security Weaknesses on a Mutual Authentication and Key Agreement Scheme in Global Mobile Networks |
Prosanta Gope and Tzonelih Hwang, National Cheng Kung University, Taiwan, R.O.C |
Volume : 4 volume number : 8 pdf |
Eye Controlled Switching Using Circular Hough Transform |
Sagar Lakhmani, Accenture Services Private Limited - Pune, India |
Volume : 4 volume number : 8 pdf |
Cryptographic Steganography |
Vikas Yadav1, Vaishali Ingale2, Ashwini Sapkal2 and Geeta Patil2, 1ZS Associates, India and 2Army Institute of Technology, India |
Volume : 4 volume number : 8 pdf |
USB Storage Device Control in Linux |
Tushar B. Kute and Kabita Ghosh, Sandip Institute of Technology and Research Centre, India |
Volume : 4 volume number : 8 pdf |
Early Heart Disease Prediction Using Data Mining Techniques |
Aditya Methaila1, Prince Kansal2, Himanshu Arya2 and Pankaj Kumar2, 1Netaji Subhas Institute of Technology, India and 2Maharaja Surajmal Institute of Technology, India |
Volume : 4 volume number : 8 pdf |
Sharing is Caring : A Data Exchange Framework for Co-Located Mobile Apps |
Joseph Milazzo, Priyanka Bagade, Ayan Banerjee, and Sandeep K.S.Gupta, Arizona State University, United States |
Volume : 4 volume number : 8 pdf |