- DocumentSecure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes - Abstractuploaded byShreyansh
- DocumentRobust Video Data Hiding Using Forbidden Data Hidinguploaded byShreyansh
- DocumentPacket-Hiding Methods for Preventing Selectiveuploaded byShreyansh
- DocumentExtended XML Tree Pattern Matching Theories and Algorithms - ABSTRACTuploaded byShreyansh
- DocumentEmbedded Extended Visual Cryptography Schemesuploaded byShreyansh
- DocumentDynamic Routing With Security Considerations - Abstractuploaded byShreyansh
- DocumentDistributed Packet Buffers for High-Bandwidth Switches and Routersuploaded byShreyansh
- DocumentCryptographic Versus Trust-based Method for Manet Routing Security - Abstractuploaded byShreyansh
- DocumentCoOperative Provableuploaded byShreyansh
- DocumentContent-Based Image Retrieval System Using Sketchesuploaded byShreyansh
- DocumentComputational Perceptual Features for Texture - ABSTRACTuploaded byShreyansh
- DocumentCompetitive Study of Cryptographyuploaded byShreyansh
- DocumentAutomatic Discovery of Associationuploaded byShreyansh
- DocumentApproval Process Management Systemuploaded byShreyansh
- DocumentAnalysis on Credit Card Fraud Detection Methodsuploaded byShreyansh
- DocumentAn Efficient Self-Organized Authentication 802.16 ABS (2)uploaded byShreyansh
- Document155141903 Slicing a New Approach for Privacy Preserving Data Publishinguploaded byShreyansh
- Document155141862 Ranking Model Adaptation Foruploaded byShreyansh
- Document155141834 Efficient Fuzzy Type Ahead Searchuploaded byShreyansh
- DocumentMust-Read Life-Changing Booksuploaded byShreyansh
- DocumentThree Mistakes of My Life by Chetan Bhagatuploaded byShreyansh
- DocumentHow to write ppt resumeuploaded byShreyansh
- DocumentHow to Write a CVuploaded byShreyansh
- DocumentPPT Resume Exampleuploaded byShreyansh
- DocumentPPT Resume Exampleuploaded byShreyansh