| Security Weaknesses on a Mutual Authentication and Key Agreement Scheme in Global Mobile Networks |
| Prosanta Gope and Tzonelih Hwang, National Cheng Kung University, Taiwan, R.O.C |
| Volume : 4 volume number : 8 pdf |
| Eye Controlled Switching Using Circular Hough Transform |
| Sagar Lakhmani, Accenture Services Private Limited - Pune, India |
| Volume : 4 volume number : 8 pdf |
| Cryptographic Steganography |
| Vikas Yadav1, Vaishali Ingale2, Ashwini Sapkal2 and Geeta Patil2, 1ZS Associates, India and 2Army Institute of Technology, India |
| Volume : 4 volume number : 8 pdf |
| USB Storage Device Control in Linux |
| Tushar B. Kute and Kabita Ghosh, Sandip Institute of Technology and Research Centre, India |
| Volume : 4 volume number : 8 pdf |
| Early Heart Disease Prediction Using Data Mining Techniques |
| Aditya Methaila1, Prince Kansal2, Himanshu Arya2 and Pankaj Kumar2, 1Netaji Subhas Institute of Technology, India and 2Maharaja Surajmal Institute of Technology, India |
| Volume : 4 volume number : 8 pdf |
| Sharing is Caring : A Data Exchange Framework for Co-Located Mobile Apps |
| Joseph Milazzo, Priyanka Bagade, Ayan Banerjee, and Sandeep K.S.Gupta, Arizona State University, United States |
| Volume : 4 volume number : 8 pdf |