Previous Issue (Vol. 1, No. 2), 2011
SHADOW MAPPING OR SHADOW VOLUME?Pages: 275-281 | |
MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOLPages: 336-343 | |
HUMAN IDENTIFICATION BASED ON EXTRACTED GAIT FEATURESPages: 358-370 | |
USING SUBTHRESHOLD SRAM TO DESIGN LOW-POWER CRYPTO HARDWAREPages: 474-483 | |