Volume 3
October 2014, Volume 3, Number 5
A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud |
August 2014, Volume 3, Number 4
The Conceptual Idea of Online Social Media site(SMS) User Account Penetration Testing System |
June 2014, Volume 3, Number 3
Error Performance of JPEG and Watermark Authentication Techniques in Wireless Sensor Network |