A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud[Pdf]
Muralikrishnan Ramane, Balaji Vasudevan and Sathappan Allaphan, University College of Engineering Villupuram, India |
The Conceptual Idea of Online Social Media site(SMS) User Account Penetration Testing System[Pdf]
Sabarathinam Chockalingam and Harjinder Singh Lallie, University of Warwick, United Kingdom |
Error Performance of JPEG and Watermark Authentication Techniques in Wireless Sensor Network[Pdf]
Mohammad Abdus Salam and Hesham Elashhab, Southern University, USA |
The Examination of Relation Between Organizational Space and Organizational Patronage [Pdf]
Fariba Azizzadeh, Islamic Azad University, Iran |
Cross-Domain Identity Trust Management for Grid Computing[Pdf]
Amr Farouk, Mohamed M. Fouad and Ahmed A. Abdelhafez, Military Technical College, Egypt |
The Relationship between Organizational Space of Offices and Corporate Identity (Case Study: General Offices in Azerbaijan) [Pdf]
Mehran Moulavi, Parivash Mohammadi, Hassan Zirak and Fariba Azizzadeh, Islamic Azad University, Iran |
A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain [Pdf]
Debiprasad Bandyopadhyay1, Kousik Dasgupta1, J. K. Mandal2 and Paramartha Dutta3, 1Kalyani Government Engineering College, India, 2Kalyani University, India and 3Visva-Bharati University, India |
Analysis and Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol for Grid Computing [Pdf]
Amr Farouk, Mohamed M. Fouad and Ahmed A. Abdelhafez, Military Technical College, Egypt |
|