Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Asian Journal of Computer Science and Information Technology
Current
Archives
About
About the Journal
Submissions
Editorial Team
Contact
Search
Quick Submit
Register
Login
Home
/
Archives
/
Vol. 2 No. 4 (2012): Asian Journal of Computer Science and Information Technology
Vol. 2 No. 4 (2012): Asian Journal of Computer Science and Information Technology
Published:
2013-10-12
Articles
SECURE AUTHENTICATION SCHEME PREVENTING WORMHOLE ATTACKS IN COGNITIVE RADIO NETWORKS
Fatty Mustafa Salem*, Maged Hamada Ibrahim, Ihab Abd El-wahab Ali
AUTHENTICATED GROUP KEY TRANSFER IMPLEMENTATION PROTOCOL BASED ON SECRET SHARING.
Aruna Averneni*, Y.V.V.N. Vara Prasad
PDF
AN INNOVATIVE APPROACH FOR OBJECT RETRIEVAL IN OBJECT-ORIENTED DATABASES: DIRECT ACCESS METHOD.
Joshi Bharti*, Morena Rustom D,
PDF
PRIVACY PRESERVATION TECHNIQUE: CLUSTER BASED CRYPTOGRAPHIC TECHNIQUES FOR PRIVATE DATA PROTECTION
Nathani Sushma*, Pinniboyina Tejaswi
PDF
THE SURVEY OF DATA MINING APPLICATIONS AND FEATURE SCOPE
Pragnyaban Mishra, Neelamadhab Padhy*, Rasmita Panigrahi
PDF
AUTOMATIC CLASSIFICATION OF MAMMOGRAM MRI USING DENDOGRAMS
A.S.Pitchumani Angayarkanni*, Nadira Banu Kamal,
PDF
EFFICIENT LIKE COMMANDS FOR DYNAMIC DATA RETRIEVAL AND REPORT GENERATION FROM PARALLEL DATABASES.
J.Vijayashree*, C.Ranichandra
PDF
EMERGING TRENDS IN WIRELESS SENSOR NETWORKS
N. Vikram Narayanadas*, N.Sainath
PDF
A MULTI-AGENT BASED SYSTEM FOR REDUCTION OF BULLWHIP EFFECT IN SUPPLY CHAIN MANAGEMENT
Vivek Jaglan*, Vikas Dhankhar, S.Srinivasan, Manoj Kumar
PDF
Developed By
Open Journal Systems
Make a Submission
Make a Submission