z-logo
open-access-imgOpen Access
Efficient Techniques for Unauthorized Attacks with Time-Stamp
Author(s) -
R. Swathi
Publication year - 2014
Publication title -
iosr journal of computer engineering
Language(s) - English
Resource type - Journals
eISSN - 2278-8727
pISSN - 2278-0661
DOI - 10.9790/0661-16651415
Subject(s) - computer science , timestamp , computer security

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here