![]() |
| 2007 | ||
|---|---|---|
| 3 | EE | F. Sheeja Mary: Erratic Cryptosystem for Elevated Message Security. ITNG 2007: 967-969 |
| 2005 | ||
| 2 | F. Sheeja Mary: Building Java Application For Mobile Users. ICWN 2005: 380-386 | |
| 2004 | ||
| 1 | F. Sheeja Mary, G. Aloysius: Universal Security Reinforcement Model Using TCE Algorithm. Software Engineering Research and Practice 2004: 952-955 | |
| 1 | G. Aloysius | [1] |