COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

October 2014, Volume 3, Number 5

A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud[Pdf]
Muralikrishnan Ramane, Balaji Vasudevan and Sathappan Allaphan, University College of Engineering Villupuram, India

August 2014, Volume 3, Number 4

The Conceptual Idea of Online Social Media site(SMS) User Account Penetration Testing System[Pdf]
Sabarathinam Chockalingam and Harjinder Singh Lallie, University of Warwick, United Kingdom

June 2014, Volume 3, Number 3

Error Performance of JPEG and Watermark Authentication Techniques in Wireless Sensor Network[Pdf]
Mohammad Abdus Salam and Hesham Elashhab, Southern University, USA

April 2014, Volume 3, Number 2

The Examination of Relation Between Organizational Space and Organizational Patronage [Pdf]
Fariba Azizzadeh, Islamic Azad University, Iran

Cross-Domain Identity Trust Management for Grid Computing[Pdf]
Amr Farouk, Mohamed M. Fouad and Ahmed A. Abdelhafez, Military Technical College, Egypt

February 2014, Volume 3, Number 1

The Relationship between Organizational Space of Offices and Corporate Identity (Case Study: General Offices in Azerbaijan) [Pdf]
Mehran Moulavi, Parivash Mohammadi, Hassan Zirak and Fariba Azizzadeh, Islamic Azad University, Iran

A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain [Pdf]
Debiprasad Bandyopadhyay1, Kousik Dasgupta1, J. K. Mandal2 and Paramartha Dutta3, 1Kalyani Government Engineering College, India, 2Kalyani University, India and 3Visva-Bharati University, India

Analysis and Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol for Grid Computing [Pdf]
Amr Farouk, Mohamed M. Fouad and Ahmed A. Abdelhafez, Military Technical College, Egypt

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN