Category Archives: ICSTS – 2015 (Volume 3 – Issue 24)

🔒
International Research Press
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Secured Authentication with 3-D Password

View Abstract & full text pdf of Secured Authentication with 3-D Password

International Academic Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Database Migration Over Heterogenious Network

View Abstract & full text pdf of Database Migration Over Heterogenious Network

🏆
Global Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Blind Authentication: A Secure Crypto-Biometric Verification Protocol

View Abstract & full text pdf of Blind Authentication: A Secure Crypto-Biometric Verification Protocol

Global Scientific Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks

View Abstract & full text pdf of Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks

🔒
International Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Analysis of Techniques used in Search Engine Optimization

View Abstract & full text pdf of Analysis of Techniques used in Search Engine Optimization

International Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Techniques Practiced in Identity-based Cryptography and Applications

View Abstract & full text pdf of Techniques Practiced in Identity-based Cryptography and Applications

🏆
Authentic Engineering Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Understanding Real-Time Face Detection Techniques

View Abstract & full text pdf of Understanding Real-Time Face Detection Techniques

Authentic Engineering Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Implementation of Non-Vulnerable Messaging System

View Abstract & full text pdf of Implementation of Non-Vulnerable Messaging System