CLIENT PUZZLE TECHINQUE TO OVERCOME DDOS IN TLS | ![]() |
DUAL-LAYER DIGITAL IMAGE WATERMARKING FOR INTELLECTUAL PROPERTY RIGHT PROTECTION | ![]() |
SECURED ARCHITECTURE STRATEGY FOR FIGHTING AGAINST BOTS | ![]() |
A CONCEPTUAL DESIGN OF A LOW COST IDENTIFICATION MANAGEMENT SYSTEM FOR NIGERIA | ![]() |
DETECTING AND RESOLVING IDENTITY CRIMES BY USING SECURE MECHANISM | ![]() |
COMPRESSION ALGORITHM OF TECHNOLOGICAL PROCESS DATA BASED ON HAAR WAVELET (Language: Russian) | ![]() |
POSSIBILITY OF FUNCTIONAL PROGRAMS VERIFICATION THROUGH APPLICATION OF MODEL CHECKING | ![]() |
USE OF THE THEORY OF CONSTRAINTS IN CASE OF IMPLEMENTATION ENTERPRISES PROJECT MANAGEMENT OFFICE (Language: Russian) | ![]() |