![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
A Traceback Attack OnFreenet |
PDF
![]() |
K. Vanitha, P. Anbumani | 113-116 |
Secure User Input Privacy in Website at A Large Scale |
PDF
![]() |
V. Vedhavalli, J. Kalaivani | 117-120 |
Enhancement of HC2D Barcode Reader for Efficient Data Recognition |
PDF
![]() |
V. Aparna, R. Muthukumar | 121-124 |
Challenges for De-Identification Policies using MapReduce in Big Data |
PDF
![]() |
N. M. Abroja, P. Bhuvana, R. Sathish Kumar | 125-129 |
Multi Stage Secret Sharing Scheme uses Lattices based Cryptography System |
PDF
![]() |
N. M. Abroja, A. Afila Parveen, E. Ranjith | 130-134 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616