×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
heresenthil documents
Documents
Analysis and Implementation of a Novel.docx
Documents
Robust Face-Name Graph Matching for Movie Character Identification
Documents
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
Documents
Projection Method for Image Watermarking
Documents
Query Planning for Continuous Aggregation Queries
Documents
Latency Equalization as a New Network Service Primitive
Documents
Gibraltar Prototype for Detection of Kernel Level Rootkits (Abstract)
Documents
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
Documents
Automatic Reconfiguration for Large-Scale Reliable Storage Systems
Documents
AMPLE an Adaptive Traffic Engineering System Based on Virtual Routing Topologies
Documents
A New Cell-Counting-Based Attack Against Tor
Documents
Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points
Documents
Fair Torrent a Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-To-Peer Systems
Documents
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Technology
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION IEEE PROJECTS 2015
Technology
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA IEEE PROJECTS 2015
Technology
COMBINING EFFICIENCY, FIDELITY, AND FLEXIBILITY IN RESOURCE INFORMATION SERVICES IEEE PROJECT 2015 2016 MICANS INFOTECH
Documents
BASE PAPER (7).pdf
Documents
resum.doc
Documents
Web Image Re Ranking Using Query Specific Semantic Signatures - IEEE Project 2014-2015
Documents
Building Confidential and Efficient Query Services in the Cloud With RASP Data Perturbation - IEEE Project 2014-2015
Next >