COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

November 2016, Volume 5, Number 4

Location Privacy Online : China, The Netherlands and South Korea
Peter Broeder1 and Yujin Lee2, 1Tilburg University, The Netherlands and 2Research Instruments, Falmouth, United Kingdom

A Wireless Fingerpring Attendance System
Pratima Patil, Ajit Khachane and Vijay Purohit, VIT - Mumbai, India

August 2016, Volume 5, Number 3

Controlling Information Flows During Software Development
Shih-Chien Chou, National Dong Hwa University, Taiwan

May 2016, Volume 5, Number 2

Dynamic Root of Trust and Challenges [Pdf]
Sandeep Romana, Himanshu Pareek and P R Lakshmi Eswari, Center for Development of Advanced Computing, India

February 2016, Volume 5, Number 1

The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First come, First-Served Source Address Validation Improvement (FCFS SAVI) [Pdf]
Mohamed Lotfi Abderrahim and Mona Gharib, University of Dammam, Saudi Arabia

Using Lattice To Dynamically Prevent Information Leakage For Web Services[Pdf]
Shih-Chien Chou, National Dong Hwa University, Taiwan

Network Intrusion Detection And Countermeasure Selection In Virtual Network (NIDCS) [Pdf]
James D. Gadze, Maxwell Cobbah and Griffith S. Klogo, Kwame Nkrumah University of Science and Technology, Ghana

An Effective Semantic Encrypted Relational Data Using K-Nn Model[Pdf]
Subhashini Padma.M and Vanitha.P, Nandha Engineering College, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN