Citation to this article as recorded by
Tan, L. and X. Sun, 2011. Robust text hashing for content-based document authentication. Inform. Technol. J., 10: 1608-1613. CrossRef |
Citation to this article as recorded by
Robust Text Hashing for Content-Based Document Authentication Information Technology Journal Vol. 10, Issue 8, 1608, 2011 |
How to cite this article
Pushpa R. Suri and Sona . Rani, 2006. Avoidance of Intruder Attack with Changed Bluetooth Authentication Procedure. Information Technology Journal, 5: 1033-1037.
DOI: 10.3923/itj.2006.1033.1037
URL: https://scialert.net/abstract/?doi=itj.2006.1033.1037
DOI: 10.3923/itj.2006.1033.1037
URL: https://scialert.net/abstract/?doi=itj.2006.1033.1037