Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Surajit Goon"'
Publikováno v:
Indian Journal of Computer Science and Engineering. 13:1168-1184
Publikováno v:
Journal of Computer Science. 18:322-338
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789819905492
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cc0635779a17722db4ec25aa9881c28e
https://doi.org/10.1007/978-981-99-0550-8_11
https://doi.org/10.1007/978-981-99-0550-8_11
Publikováno v:
Emerging Technologies in Data Mining and Information Security ISBN: 9789811941924
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c7a6aa3c387d96d34208c407f2bbc54f
https://doi.org/10.1007/978-981-19-4193-1_63
https://doi.org/10.1007/978-981-19-4193-1_63
Publikováno v:
Emerging Technologies in Data Mining and Information Security ISBN: 9789811941924
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::76fc71a8636d5b941fed4c5b42b593dc
https://doi.org/10.1007/978-981-19-4193-1_62
https://doi.org/10.1007/978-981-19-4193-1_62
Publikováno v:
Cyber Intelligence and Information Retrieval ISBN: 9789811642838
Distribution of Internet banking credentials like user ID, login password, and transactional password is the most critical step and prone to forgery and hacking. We proposed a methodology by which banks can distribute the same in a much safer way. Th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::92fa32425bc951a6c7963bff07969cd5
https://doi.org/10.1007/978-981-16-4284-5_6
https://doi.org/10.1007/978-981-16-4284-5_6
In this advance technical time, we all need accuracy to any security system. Among all security system, biometric recognition process is very popular in that time. Not only security purpose, identification is the main cause of using biometric charact
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::77e0d87b04701dd0767e3290bf2ef48a
Publikováno v:
2014 International Conference on Informatics, Electronics & Vision (ICIEV).
Viruses and malwares spread around mobile networks with the rapid growth of smart cell phone users. In a mobile network, viruses and malwares can cause privacy data leakage and remote listening. Additionally, they can jam wireless servers by sending