来源:International Journal of Computer Technology and Applications , 2011
作者:Rajasekhar Mungara, K.VenkateswaraRao, VenkataSubbaReddy Pallamreddy
关键词:Security;key management;...
使用许可:Unknown
来源:International Journal of Computer Technology and Applications , 2011
作者:Suketu D. Nayak, Ravindra K. Gupta
关键词:Malicious;Mechanism;...
使用许可:Unknown
3 Methods and Techniques to Protect the Privacy Information in Privacy Preservation Data Mining [期刊论文]
来源:International Journal of Computer Technology and Applications , 2011
作者:R.Amsaveni, N.Punitha
关键词:Privacy;Security;...
使用许可:Unknown
来源:International Journal of Computer Technology and Applications , 2011
作者:Prof.T.Venkat Narayana Rao, Ch Panchamukesh, A.Vijay Kumar
关键词:Kerberos;System Policy;...
使用许可:Unknown
5 A Genetic Based Non-Invertible Cryptographic Key Generation From Cancelable Biometric in MANET [期刊论文]
来源:International Journal of Computer Technology and Applications , 2011
作者:Hiteishi Diwanji, Jagdish S Shah, Manisha Mehta
关键词:MANET;Fingerprint Minutiae;...
使用许可:Unknown
来源:International Journal of Computer Technology and Applications , 2011
作者:R.Srividhya, Boopathy.D
关键词:Cloud computing;Security;...
使用许可:Unknown