×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of ijsptm
Hash Based Least Significant Bit Technique for Video Steganography(HLSB)
80 views
Credit Card Fraud Detection Based on Ontology Graph
31 views
The relationship between organizational space of offices and corporate identity (case study general offices in azerbaijan)
189 views
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
705 views
A novel secure image steganography method based on chaos theory in spatial domain
28.801 views
Security system with face recognition, sms alert and embedded network video monitoring terminal
803 views
Malicious pdf document detection based on feature extraction and entropy
439 views
Error performance of jpeg and watermark
37 views
The conceptual idea of online social media
30 views
Performance Evaluation of Message Security Using Fractal Sieve with MMD
120 views
Analysis and improvement of pairing free certificate-less two-party authenticated key agreement protocol for grid computing
117 views
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense Mobile Ad Hoc Networks
96 views
AN EVALUATION OF ENERGY EFFICIENT SOURCE AUTHENTICATION METHODS FOR FALSE DATA FILTERING IN WSN
164 views
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONSHIPS IN AN INFORMATION FLOW CONTROL MODEL
159 views
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
137 views
A novel multifactor authentication system ensuring usability and security
847 views
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
12.348 views
IJSPTM 010602
8 views
Towards Pervasive Computing Environments With Cloud Services
737 views
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service
603 views
Next >