October 20, 2014

Study on Strategy of Account Security Based on SQL Server Database |FTD0919

Study on Strategy of Account Security Based on SQL Server Database : IEEE2009 Abstract: As the aggregation of information, database system is the core part of […]
October 20, 2014

Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks | FTD0909

Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks : IEEE 2009 Abstract: The unreachability problem (i.e., the so-called void problem) that exists in the greedy […]
October 20, 2014

Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows | FTD0908

Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows : IEEE 2009 Abstract: We study multicast in a noncooperative environment where information flows selfishly route themselves through […]
October 20, 2014

Two Factor Authentication Using Mobile Phones |FTD0920

Two Factor Authentication Using Mobile Phones : IEEE2009 Abstract: This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees […]
October 20, 2014

Development and Design of a New Logistics Information Management System | FTD0907

Development and Design of a New Logistics Information Management System : IEEE 2009 Abstract: Along with the gradual maturity of distributed computing platform J2EE, J2EE has […]