Security is a major issue in Automated Teller Machine (ATM).with the wide spread utilization of electronic transactions it is necessary to increase customers recognition accuracy. Biometric systems can offer convenient a...
Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By m...
Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...
E-Commerce has advanced quickly in a very short span and is changing the face of business. It deals with carrying out business transactions with the aid of Internet through linked computer systems of host, buyer and the...
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. All these studies are at a very high level, leaving many design...
EP ID EP89731
DOI -
Views 161
Downloads 0
How To Cite
P. Iswarya, Dr. V. Radha (2015). . International Journal of Computer Science & Engineering Technology, 6(6),
386-391. https://europub.co.uk/articles/-A-89731
Sign In Europub
For faster login or register use your social account.
A Comparative Study on ATM Security with Multimodal Biometric System
Security is a major issue in Automated Teller Machine (ATM).with the wide spread utilization of electronic transactions it is necessary to increase customers recognition accuracy. Biometric systems can offer convenient a...
A Secure Image Steganography Method Based on Neural Network
Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By m...
TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS
Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...
A Review on the Factors that have Driven E-Commerce in Modern Day Business
E-Commerce has advanced quickly in a very short span and is changing the face of business. It deals with carrying out business transactions with the aid of Internet through linked computer systems of host, buyer and the...
Peer to Peer Cooperation for Caching in Wireless Networks
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. All these studies are at a very high level, leaving many design...