View Abstract & full text pdf of Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
Category Archives: ICSTS – 2015 (Volume 3 – Issue 24)
View Abstract & full text pdf of Blind Authentication: A Secure Crypto-Biometric Verification Protocol
View Abstract & full text pdf of Review on Li-Fi Technology
View Abstract & full text pdf of Database Migration Over Heterogenious Network
View Abstract & full text pdf of Secured Authentication with 3-D Password
View Abstract & full text pdf of Non-Vulnerable Messaging System
View Abstract & full text pdf of Implementation of Non-Vulnerable Messaging System
View Abstract & full text pdf of Understanding Real-Time Face Detection Techniques
View Abstract & full text pdf of Techniques Practiced in Identity-based Cryptography and Applications
View Abstract & full text pdf of Analysis of Techniques used in Search Engine Optimization