Abstract

Authors and Affiliations

P. Iswarya , Dr. V. Radha

Keywords

Related Articles

A Comparative Study on ATM Security with Multimodal Biometric System

Security is a major issue in Automated Teller Machine (ATM).with the wide spread utilization of electronic transactions it is necessary to increase customers recognition accuracy. Biometric systems can offer convenient a...

A Secure Image Steganography Method Based on Neural Network

Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By m...

TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS

Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...

A Review on the Factors that have Driven E-Commerce in Modern Day Business

E-Commerce has advanced quickly in a very short span and is changing the face of business. It deals with carrying out business transactions with the aid of Internet through linked computer systems of host, buyer and the...

Peer to Peer Cooperation for Caching in Wireless Networks

Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. All these studies are at a very high level, leaving many design...

Download PDF file
  • EP ID EP89731
  • DOI -
  • Views 161
  • Downloads 0

How To Cite

P. Iswarya, Dr. V. Radha (2015).  . International Journal of Computer Science & Engineering Technology, 6(6), 386-391. https://europub.co.uk/articles/-A-89731