Manuscript Submission for IJCSMA
Submit articles via Scholars Central
Research Article
Introducing Two-Factor Authentication for the Block Chain Protocol with help of Hash Algorithm
Internet Enable Devices Security for Society
Protect of Security: Firewalls
Security Issues of Enabling Technologies for Internet of Things
Smart Vehicle Tracking System
Study of Emerging Threats in Cyber-Security