Countering Phishing Threats using Visual Cryptography

Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 3

Abstract

Countering Phishing Threats using Visual Cryptography

Authors and Affiliations

Keywords

Related Articles

Solving a Multi Objective Fuzzy Variable Linear Programming Problem using Ranking Functions

A new method for solving fuzzy variable linear programming problems directly using linear ranking functions is described and is applied for Simplex method in [3]. In this paper, we extend the concept for solving a Multi...

A Case Report of Epidermal Cyst of the Eyelid

Epidermal cyst of the eyelid in itself is of rare occurrence. It is frequently seen on the upper eyelid either on the conjunctiva or skin surface. More common in men, either in 2nd and 3rd decade. It is usually asymptoma...

An Empirical Analysis of the Impact of Agricultural Banking Industry profitability in Bangladesh: An Evaluation of Internal Indicators of RAKUB

The study is on diagnostic and exploratory in nature and it depends on secondary data. The finding shows a steady growth in terms of branches, manpower, deposits, loan & advances, investments, total income, total expendi...

Applying Opportunistic Scheduling On Miso Wiretap Broadcast Channel

The problem of broadcasting secret information over wireless links under an secrecy constraint has recently been considered in this paper. The work was among the first to consider the impact of multiuser diversity on s...

The NC Machining Post-Processing Technology Based on UG

Post-processing technology is the key to CNC automatic programming technology and an important module of the CAD / CAM system. Post-processing technology converts the NC program that is produced by the CNC automatic prog...

Download PDF file
  • EP ID EP334770
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

(2013). Countering Phishing Threats using Visual Cryptography. UNKNOWN, 2(3), -. https://europub.co.uk/articles/-A-334770