Location Privacy Online : China, The Netherlands and South Korea
Peter Broeder1 and Yujin Lee2, 1Tilburg University, The Netherlands and 2Research Instruments, Falmouth, United Kingdom
A Wireless Fingerpring Attendance System
Pratima Patil, Ajit Khachane and Vijay Purohit, VIT - Mumbai, India
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First come, First-Served Source Address Validation Improvement (FCFS SAVI) [Pdf]
Mohamed Lotfi Abderrahim and Mona Gharib, University of Dammam, Saudi Arabia
Using Lattice To Dynamically Prevent Information Leakage For Web Services[Pdf]
Shih-Chien Chou, National Dong Hwa University, Taiwan
Network Intrusion Detection And Countermeasure Selection In Virtual Network (NIDCS) [Pdf]
James D. Gadze, Maxwell Cobbah and Griffith S. Klogo, Kwame Nkrumah University of Science and Technology, Ghana
An Effective Semantic Encrypted Relational Data Using K-Nn Model[Pdf]
Subhashini Padma.M and Vanitha.P, Nandha Engineering College, India