Data collection in multi application sharing

8 years ago 235 Views

Service operator aware trust scheme for resource

8 years ago 214 Views

Reducing fragmentation for in line deduplication

8 years ago 286 Views

Data collection in multi application sharing

8 years ago 246 Views

Authenticated key exchange protocols

8 years ago 382 Views

Revealing the trace of high quality jpeg

8 years ago 155 Views

Smart crawler a two stage crawler

8 years ago 1168 Views

Authenticated key exchange protocols

8 years ago 169 Views

Steganography using reversible texture synthesis

8 years ago 670 Views