IJCAIT Vol 2, Issue 3, 2013


TABLE OF CONTENTS


Articles

User Authentication Methods and Techniques by Graphical Password: A Survey PDF
Swetha Sathish, Asha B Joshi and Ganeshayya I Shidaganti 1-4
A More Secure Chaos Based Encryption System with High Compression Capability PDF
Anjali Elizabeth Joseph and Amel Austine 5-8
A survey on e-Resources by users PDF
Pardeep Mittal and Monu Bala 9-16
Development of New Algorithm for Finding 2nd Level Association Rules using Fast Apriori Implementation PDF
Arpna Shrivastava and R.C. Jain 17-20
Intrusion Detection System against Blackhole Attack in Wireless Network PDF
Vishnu Priya P. and Thanapal P. 21-27
Segmentation using Morphological Watershed Transformation for Counting Blood Cells PDF
Hemant Tulsani, Saransh Saxena and Naveen Yadav 28-36


© 2012 onwards International Journal of Computer Applications & Information Technology

International Journal of Computer Applications & Information Technology
All rights reserved are reserved to Chief Editor IJCAIT.

For any Technical Support editorijcait@gmail.com