×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of heresenthil
Analysis and Implementation of a Novel.docx
93 views
Robust Face-Name Graph Matching for Movie Character Identification
188 views
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
166 views
Projection Method for Image Watermarking
41 views
Query Planning for Continuous Aggregation Queries
101 views
Latency Equalization as a New Network Service Primitive
82 views
Gibraltar Prototype for Detection of Kernel Level Rootkits (Abstract)
30 views
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
17 views
Automatic Reconfiguration for Large-Scale Reliable Storage Systems
47 views
AMPLE an Adaptive Traffic Engineering System Based on Virtual Routing Topologies
56 views
A New Cell-Counting-Based Attack Against Tor
39 views
Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points
107 views
Fair Torrent a Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-To-Peer Systems
122 views
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
130 views
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION IEEE PROJECTS 2015
153 views
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA IEEE PROJECTS 2015
46 views
COMBINING EFFICIENCY, FIDELITY, AND FLEXIBILITY IN RESOURCE INFORMATION SERVICES IEEE PROJECT 2015 2016 MICANS INFOTECH
23 views
BASE PAPER (7).pdf
46 views
resum.doc
11 views
Web Image Re Ranking Using Query Specific Semantic Signatures - IEEE Project 2014-2015
120 views
Next >