

Table of Contents
Articles
One-Time Password Authentication Techniques Survey |
PDF
![]() |
M. Ahmed Samy, B. Youssef, S. El Gamal, A. El Hadi Nabeeh | 69-78 |
Cloud Computing with Mobile-Fi Technology Using Transposition and Substitution Cipher in Job Scheduling |
PDF
![]() |
V. B. Kirubanand | 79-83 |
A Novel Method for Clustering Words in Micro-Blogs Texts and its Application to Event Discovery |
PDF
![]() |
B. Ramana Babu | 84-88 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578