Login / Signup
Securing Our Bluetooth Mobiles From Intruder Attack Using Enhanced Authentication Scheme And Plausible Exchange Algorithm
A. Rathika
R. Saranya
R. Iswarya
Published in:
CoRR (2010)
Keyphrases
</>
digital images
lightweight
region of interest
security analysis