Security threats in radio frequency identification tech. 23:keyloggers:legitimate product or hacking tools. 24:dlp. 25:google page rank. 26:optimizing bittorent performance to enable real time download. 27:keyboard without keyboard-A survey of virtual keyboards. 38:role of cross platform languages and glogus toolkit in grid computing.
Security threats in radio frequency identification tech. 23:keyloggers:legitimate product or hacking tools. 24:dlp. 25:google page rank. 26:optimizing bittorent performance to enable real time download. 27:keyboard without keyboard-A survey of virtual keyboards. 38:role of cross platform languages and glogus toolkit in grid computing.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
Security threats in radio frequency identification tech. 23:keyloggers:legitimate product or hacking tools. 24:dlp. 25:google page rank. 26:optimizing bittorent performance to enable real time download. 27:keyboard without keyboard-A survey of virtual keyboards. 38:role of cross platform languages and glogus toolkit in grid computing.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
1:intelligent cellular campus. 2:mobile traffic viewer. 3:N/W security in 3g mobile system. 4:a survey on security in mobile adhoc networks. 5:wimax networking and implementation in defence application. 6:Bluetooth based wireless sensor network in lane departure warning for vehicles. 7:new trends in wireless tech. 8:solar power enabled mobile phones. 9:preserving location privacy in wireless lans. 10:wireless tech in building management system. 11:contrling system in lan using single keyboard and mouse. 12:red traction:means for human area N/W. 13:minisec: a secure sensor network communication archit. 14: network performance enhancement at the proxy server. 15:neural network as a programmable block cilper. 16:secured M Banking using Stenography and IMEI number of mobile phones. 17:challenges for cyber security of the nation. 18:an agent based approach for one time authentication. 19:cryptix. 20:preventing the miss use of email id. 21:how secure ur fingerprint. 22:security threats in radio frequency identification tech. 23:keyloggers:legitimate product or hacking tools. 24:dlp. 25:google page rank. 26:implemention of GPS in tracking system. 27:optimizing bittorent performance to enable real time download. 28:it challenge in rural areas. 29:student e card system,category: virtualization in education domain. 30:attendance automation system;an image differencing approach. 31:data preparation for mining world wide web browsing pattern. 32:N-Track system. 33:space time vedio completion. 34:keyboard without keyboard-A survey of virtual keyboards. 35:steps towars better software maintenance. 36:implementation of high level bulletin board system 37:object identification in procedural prog. 38:role of cross platform languages and glogus toolkit in grid computing. 39:cloud computing. 40:silent communicator 41:future of sound. 42:impact of embedded system evolution on RTOS use and design. 43:voice enabled I-ROBOT.