HARDWARE SECURITY MODEL WITH VEDIC MULTIPLIER BASED ECC ALGORITHM ON HIGH-PERFORMANCE FPGA DEVICESaurabh Singh, Sunita Soni
|
SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORMS. Jyothi Lekshmi, A. R. Anil
|
ANALYSIS OF COMPUTATION TIME IN FALL DETECTION SYSTEM EMBEDDED WITH WHEEL CHAIRSG Uma Devi1, Rupayan Das2, V Malathy3
|
PREVENTING CLICK EVENT HIJACKING BY USER INTENTION INFERENCEKailas Patil
|
BER EVALUATION OF LDPC CODES WITH GMSK IN NAKAGAMI FADING CHANNELSurbhi Sharma, Rajesh Khanna
|
SURVEY ON CRIME ANALYSIS AND PREDICTION USING DATA MINING TECHNIQUESH Benjamin Fredrick David, A Suruliandi
|