Found: 3 resources
Listing 1 - 3 of 3
Sort by
Secret Sharing Scheme Based Technique for Authentication of Documents Images
Engineering and Technology Journal, 2014, Volume 32, Issue 6 Part (B) Scientific, Pages 1092-1105
Detect and Prevent SQLIA by Dynamic Monitoring
Iraqi Journal of Information Technology, 2014, Volume 6, Issue 4 اللغة الانكليزية, Pages 34-42
Cloud Based Secure Web Application
Engineering and Technology Journal, 2015, Volume 33, Issue 8 Part (B) Scientific, Pages 1549-1560
Listing 1 - 3 of 3
Sort by