TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON

11 years ago 2779 Views

Cloud computing and security issues in the

10 years ago 1893 Views

Ijnsa050204

11 years ago 913 Views

SECURITY ALGORITHMS FOR WIMAX

10 years ago 818 Views

EARLY DETECTION OF SQL INJECTION ATTACKS

10 years ago 797 Views

A fair exchange & customer anonymity protocol

10 years ago 729 Views