How Unique and Traceable are Usernames?
HowTo Authenticate and Encrypt
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS
Hybrid Spam Filtering for Mobile Communication