Citation to this article as recorded by
Raj, P., C. Nithya, A. Parvathy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. Elucidating the robust and resilient cloud security solution approaches. Res. J. Inform. Technol., 5: 442-448. CrossRefDirect Link |
Rezai, A. and P. Keshavarzi, 2012. A New cmm-naf modular exponentiation algorithm by using a new modular multiplication algorithm. Trends Applied Sci Res., 7: 240-247. CrossRefDirect Link |
Citation to this article as recorded by
A New CMM-NAF Modular Exponentiation Algorithm by using a New Modular Multiplication Algorithm Trends in Applied Sciences Research Vol. 7, Issue 3, 240, 2012 |
How to cite this article
N.A. Azeez, A.P. Abidoye, K.K. Agbele and A.O. Adesina, 2012. A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment. Trends in Applied Sciences Research, 7: 78-86.
URL: https://scialert.net/abstract/?doi=tasr.2012.78.86
URL: https://scialert.net/abstract/?doi=tasr.2012.78.86