Citation to this article as recorded by
Azeez, N.A., A.P. Abidoye, K.K. Agbele and A.O. Adesina, 2012. A dependable model for attaining maximum authentication security procedure in a grid based environment. Trends Appl. Sci. Res., 7: 78-86. CrossRef |
Azeez, N.A., I. Tiko, I.M. Venter, O.F.W. Onifade and R.A. Azeez, 2011. Grid security: Evaluation of active and passive attacks with proposed countermeasures. Res. J. Inform. Technol., 3: 181-190. CrossRefDirect Link |
Jiang, M.F., 2012. A new adaptive visible watermarking algorithm for document images. Inform. Technol. J., 11: 1322-1326. CrossRef |
Citation to this article as recorded by
A Reversible Database Watermark Scheme for Textual and Numerical Datasets 2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) |
Grid Security: Evaluation of Active and Passive Attacks with Proposed Countermeasures Research Journal of Information Technology Vol. 3, Issue 3, 181, 2011 |
A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment Trends in Applied Sciences Research Vol. 7, Issue 1, 78, 2012 |
How to cite this article
V. Prasannakumari , 2009. A Robust Tamperproof Watermarking for Data Integrity in Relational Databases. Research Journal of Information Technology, 1: 115-121.
URL: https://scialert.net/abstract/?doi=rjit.2009.115.121
URL: https://scialert.net/abstract/?doi=rjit.2009.115.121