![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
One-Time Password Authentication Techniques Survey |
PDF
![]() |
M. Ahmed Samy, B. Youssef, S. El Gamal, A. El Hadi Nabeeh | 69-78 |
Cloud Computing with Mobile-Fi Technology Using Transposition and Substitution Cipher in Job Scheduling |
PDF
![]() |
V. B. Kirubanand | 79-83 |
A Novel Method for Clustering Words in Micro-Blogs Texts and its Application to Event Discovery |
PDF
![]() |
B. Ramana Babu | 84-88 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578