user account
134 Oracle Applications System Administrator's Guide Security [ PUNISHER ] pdf
150
Secured Transaction Using Secured Image
5
A Literature Survey On Towards Detecting Anomalous User Behavior in Online Social Networks
7
ENHANCING FILE AND SYSTEM SECURITY BY ADDING LOADABLE KERNEL MODULE FOR REMOVABLE STORAGE DEVICE
8
Authenticating using Variable One Time Password in Cloud Computing over Existing Honey Pot Technology for Framework Improvement
6
Development of Mail Tracking System
6
Enhanced Secure Multi Keyword Top-K Retrieval in Cloud
5
Online Full Text
6
Mk_accounts: an enterprise-wide account management tool for Unix operating systems.
29
How Does Twitter User Behavior Vary Across Demographic Groups?
7
deploying openstack pdf
86
A Shoulder Surfing Resistance using HMAC Algorithm
5
chapter23_linux_security.pdf
41
Automation of Engineering College using College Management System
11
Dialectic Antidotes to Critics of the Technology Acceptance Model: Conceptual, Methodological, and Replication Treatments for Behavioural Modelling in Technology-Mediated Environments
11
Online Crop and Water Management system
5
Public Integrity Auditing For Dynamic Data Sharing With Multiuser Modification
8
Integrity Checking For Secure Cloud Storage
9
ENHANCEMENT OF AES ALGORITHM BASED ON CHAOTIC MAPS AND SHIFT OPERATION FOR IMAGE ENCRYPTION
10
A Noval Approach Key Aggregate Cryptosystem for Resizable Data Sharing in Cloud Storage
5