Table of Contents
Articles
| One-Time Password Authentication Techniques Survey |
PDF
|
| M. Ahmed Samy, B. Youssef, S. El Gamal, A. El Hadi Nabeeh | 69-78 |
| Cloud Computing with Mobile-Fi Technology Using Transposition and Substitution Cipher in Job Scheduling |
PDF
|
| V. B. Kirubanand | 79-83 |
| A Novel Method for Clustering Words in Micro-Blogs Texts and its Application to Event Discovery |
PDF
|
| B. Ramana Babu | 84-88 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578