![]() | ![]() |
2007 | ||
---|---|---|
3 | EE | F. Sheeja Mary: Erratic Cryptosystem for Elevated Message Security. ITNG 2007: 967-969 |
2005 | ||
2 | F. Sheeja Mary: Building Java Application For Mobile Users. ICWN 2005: 380-386 | |
2004 | ||
1 | F. Sheeja Mary, G. Aloysius: Universal Security Reinforcement Model Using TCE Algorithm. Software Engineering Research and Practice 2004: 952-955 |
1 | G. Aloysius | [1] |