

Table of Contents
Articles
A Traceback Attack OnFreenet |
PDF
![]() |
K. Vanitha, P. Anbumani | 113-116 |
Secure User Input Privacy in Website at A Large Scale |
PDF
![]() |
V. Vedhavalli, J. Kalaivani | 117-120 |
Enhancement of HC2D Barcode Reader for Efficient Data Recognition |
PDF
![]() |
V. Aparna, R. Muthukumar | 121-124 |
Challenges for De-Identification Policies using MapReduce in Big Data |
PDF
![]() |
N. M. Abroja, P. Bhuvana, R. Sathish Kumar | 125-129 |
Multi Stage Secret Sharing Scheme uses Lattices based Cryptography System |
PDF
![]() |
N. M. Abroja, A. Afila Parveen, E. Ranjith | 130-134 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616