Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
Enforcing SET and SSL Protocols in E-payment
Nancy Awadallah
Computer Science & Information Technology
April 2017, Number 2, April, 2017
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
Shafali Agarwal
Computer Science & Information Technology
9, 2, April, 2017
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
Veena G.S
Computer Science & Information Technology
Vol 3, Num 9, December, 2013
ANALYSIS MUSIC CONCERTS ADOPTING THE MATHEMATICAL MODEL OF HIT PHENOMENA
Kawahata Yasuko
Computer Science & Information Technology
Vol 3, Num 9, December, 2013
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
Belazi Akram
Computer Science & Information Technology
Vol 4, Num13, December, 2008
DATA CHARACTERIZATION TOWARDS MODELING FREQUENT PATTERN MINING ALGORITHMS
Sayaka Akioka
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
USER-CENTRIC PERSONALIZED MULTIFACET MODEL TRUST IN ONLINE SOCIAL NETWORK
Liu Ban Chieng
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
3D VISION-BASED DIETARY INSPECTION FOR THE CENTRAL KITCHEN AUTOMATION
Yue-Min Jiang
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
EVENT DETECTION IN TWITTER USING TEXT AND IMAGE FUSION
Samar Alqhtani
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
EFFECT OF GRID-ADAPTIVE INTERPOLATION OVER DEPTH IMAGES
Arbaaz Singh
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
OUTSOURCED KP-ABE WITH CHOSENCIPHERTEXT SECURITY
Jinmiao Wang
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
Vahab Pournaghshband
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
Heekyeong Noh
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCHEME FOR LTE-A NETWORKS
Zaher Jabr Haddad
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING
Abbas Akkasi
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
DT-BAR: A DYNAMIC ANT RECOMMENDER TO BALANCE THE OVERALL PREDICTION ACCURACY FOR ALL USERS
Abdelghani Bellaachia
Computer Science & Information Technology
Vol 4, Num 13, December, 2014
ISSUES, CHALLENGES, AND SOLUTIONS: BIG DATA MINING
Julie M. David
Computer Science & Information Technology
Vol 4, Num 13, December, 2014
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119