Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • Enforcing SET and SSL Protocols in E-payment
  • Nancy Awadallah
  • Computer Science & Information Technology
  • April 2017, Number 2, April, 2017

  • IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
  • Shafali Agarwal
  • Computer Science & Information Technology
  • 9, 2, April, 2017

  • AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
  • Veena G.S
  • Computer Science & Information Technology
  • Vol 3, Num 9, December, 2013

  • ANALYSIS MUSIC CONCERTS ADOPTING THE MATHEMATICAL MODEL OF HIT PHENOMENA
  • Kawahata Yasuko
  • Computer Science & Information Technology
  • Vol 3, Num 9, December, 2013

  • SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
  • Belazi Akram
  • Computer Science & Information Technology
  • Vol 4, Num13, December, 2008

  • DATA CHARACTERIZATION TOWARDS MODELING FREQUENT PATTERN MINING ALGORITHMS
  • Sayaka Akioka
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • USER-CENTRIC PERSONALIZED MULTIFACET MODEL TRUST IN ONLINE SOCIAL NETWORK
  • Liu Ban Chieng
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • 3D VISION-BASED DIETARY INSPECTION FOR THE CENTRAL KITCHEN AUTOMATION
  • Yue-Min Jiang
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • EVENT DETECTION IN TWITTER USING TEXT AND IMAGE FUSION
  • Samar Alqhtani
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • EFFECT OF GRID-ADAPTIVE INTERPOLATION OVER DEPTH IMAGES
  • Arbaaz Singh
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • OUTSOURCED KP-ABE WITH CHOSENCIPHERTEXT SECURITY
  • Jinmiao Wang
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
  • Vahab Pournaghshband
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
  • Heekyeong Noh
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCHEME FOR LTE-A NETWORKS
  • Zaher Jabr Haddad
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING
  • Abbas Akkasi
  • Computer Science & Information Technology
  • Vol 4, Num 12, December, 2014

  • DT-BAR: A DYNAMIC ANT RECOMMENDER TO BALANCE THE OVERALL PREDICTION ACCURACY FOR ALL USERS
  • Abdelghani Bellaachia
  • Computer Science & Information Technology
  • Vol 4, Num 13, December, 2014

  • ISSUES, CHALLENGES, AND SOLUTIONS: BIG DATA MINING
  • Julie M. David
  • Computer Science & Information Technology
  • Vol 4, Num 13, December, 2014

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals