Broadband Internet Penetration in Nigeria: A Review
Chinecherem Umezuruike, Awodele Oludele, Kuyoro S. O., Izang Aaron A
Policies Based Privacy Control Mechanisms for Social
Srikar Swamy, G. Suday Kiran
Vendor Lock in Winds Relocation to Meta Cloud
Ravi Kumar.K, K. Bheemalingappa
Data Security for Unreliable Clouds Using Reliable Encryption
Veeresh, K. Arjun
Gaps of Cryptography and Their Automatic Treatments with Reference to Classical Cryptography Methods
Dr. Mozamel M. Saeed
Fast Computation of Cubic Bernstein Polynomials in CNC Interpolation
ZENG Yu, WANG Xingbo