

Table of Contents
Articles
Three Layer End-To-End Data Transaction Using Firewall |
PDF
![]() |
R. Ramya Krishna, R. Sankar | 137-139 |
Information Hiding Using Temporally Brightness Modulated Pattern |
PDF
![]() |
Dr. K. Kalaiselvi, S. Kamaleshwar Rao, V. Prashanth, P. Nivas, T. Karthikeyan | 140-142 |
Impasse Notifier |
PDF
![]() |
P. Chithiran, G. Dhanabalan, N. Mekala, R. Sumithra, K. Murugan | 143-145 |
Facing Security Problems in Big Data and Hadoop |
PDF
![]() |
P. S. Vijayalakshmi, S. Lakshmidevi, T. Arunambika | 146-148 |
Enhanced Secure Data Transmission Using RSA Algorithm, Singular - Value Decomposition and Steganography |
PDF
![]() |
S. Ubashini, S. Sowndarya, S. Vennila, M. Thivakar, P. Geetha | 149-151 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616