Found: 2 resources
Listing 1 - 2 of 2
Sort by
Secret Sharing Scheme Based Technique for Authentication of Documents Images
Engineering and Technology Journal, 2014, Volume 32, Issue 6 Part (B) Scientific, Pages 1092-1105
Detect and Prevent SQLIA by Dynamic Monitoring
Iraqi Journal of Information Technology, 2014, Volume 6, Issue 4 اللغة الانكليزية, Pages 34-42
Listing 1 - 2 of 2
Sort by