In decades, authentication system is relying on username and password as passphrase object for authentication process. The username and password mechanism bring
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnolo
The book is a collection of best papers presented in International Conference on Intelligent Computing and Applications (ICICA 2016) organized by Department of
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cr