Works matching IS 23216859 AND DT 2015 AND VI 3 AND IP 2
Results: 4
Secure Watermarking using Diophantine Equations for Authentication and Recovery.
- Published in:
- Journal of Network & Information Security, 2015, v. 3, n. 2, p. 1, doi. 10.21863/jnis/2015.3.2.006
- By:
- Publication type:
- Article
Application of Quaternion Numbers in Identification Scheme.
- Published in:
- Journal of Network & Information Security, 2015, v. 3, n. 2, p. 17, doi. 10.21863/jnis/2015.3.2.008
- By:
- Publication type:
- Article
Mitigating Virtual Machine Denial of Service Attacks from Mobile APPS.
- Published in:
- Journal of Network & Information Security, 2015, v. 3, n. 2, p. 21, doi. 10.21863/jnis/2015.3.2.007
- By:
- Publication type:
- Article
Restricted Constraints in the Problem of Maximum Attainable Flow in Minimum Cost in a Network.
- Published in:
- Journal of Network & Information Security, 2015, v. 3, n. 2, p. 32, doi. 10.21863/jnis/2015.3.2.009
- By:
- Publication type:
- Article