|
TABLE OF CONTENTS
Articles
User Authentication Methods and Techniques by Graphical Password: A Survey | |
Swetha Sathish, Asha B Joshi and Ganeshayya I Shidaganti | 1-4 | A More Secure Chaos Based Encryption System with High Compression Capability |
Anjali Elizabeth Joseph and Amel Austine | 5-8 | A survey on e-Resources by users |
Pardeep Mittal and Monu Bala | 9-16 | Development of New Algorithm for Finding 2nd Level Association Rules using Fast Apriori Implementation |
Arpna Shrivastava and R.C. Jain | 17-20 | Intrusion Detection System against Blackhole Attack in Wireless Network |
Vishnu Priya P. and Thanapal P. | 21-27 | Segmentation using Morphological Watershed Transformation for Counting Blood Cells |
Hemant Tulsani, Saransh Saxena and Naveen Yadav | 28-36 |
All rights reserved are reserved to Chief Editor IJCAIT.