Browse Title Index


 
Issue Title
 
Vol 1, No 3 (2012) A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications Abstract   PDF
M. ABRI, H. BADAOUI, Z. BERBER
 
Vol 1, No 2 (2012) A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model Abstract   PDF
Anubhav Chitrey, Dharmendra Singh, Monark Bag, Vrijendra Singh
 
Vol 7, No 2 (2018): Accepted List A Dynamic Multi-Layer Signature based Intrusion Detection System with Pattern Similarity and Recognition Abstract
Urmila T.S.
 
Vol 1, No 2 (2012) A New Proxy Blind Signature Scheme Based on DLP Abstract   PDF
Swati Verma, Birendra Kumar Sharma
 
Vol 1, No 3 (2012) A New Signature Scheme Based on Factoring and Discrete Logarithm Problems Abstract   PDF
Swati Verma, Birendra Kumar Sharma
 
Vol 1, No 1 (2012) A Password attack on S-3 PAKE Protocol Abstract   PDF
SHIRISHA TALLAPALLY
 
Vol 1, No 2 (2012) A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael Abstract   PDF
Samir El Adib, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab, Abdellah El Abbous, Omar Benarchid
 
Vol 1, No 2 (2012) A Trust Based Approach For Secure Access Control In Information Centric Network Abstract   PDF
Sapna Singh, Archana Puri, Shiksha Smreti Singh, Anurika Vaish, S. Venkatesan
 
Vol 1, No 2 (2012) AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization Abstract   PDF
Samir El Adib, Naoufal Raissouni
 
Vol 1, No 3 (2012) An Efficient ID-Based Proxy Signcryption Scheme Abstract   PDF
G. Swapna, P.V.S.S.N. Gopal, T. Gowri, P. Vasudeva Reddy
 
Vol 2, No 1 (2013) An Efficient RSA Cryptosystem with BM-PRIME Method Abstract   PDF
Sushma Pradhan, Birendra Kumar Sharma
 
Vol 2, No 1 (2013) An Optimal Sinsing Algorithm for Multiband Cognitive Radio Network Abstract   PDF
Gamal A. F. M. Khalaf
 
Vol 1, No 4 (2012) Attack on Fully Homomorphic Encryption over the Integers Abstract   PDF
Gu Chun-sheng
 
Vol 1, No 3 (2012) Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM) Abstract   PDF
Jogendra Kumar
 
Vol 1, No 3 (2012) Client Side CSRF Defensive Tool Abstract   PDF
Rupali D. Kombade, B.B. Meshram
 
Vol 1, No 3 (2012) Compact and Integrated Routing Photonic Crystals Structures Design Using the Two-dimensional FDTD Method Abstract   PDF
Hadjira Badaoui, Mohammed Feham, Mehadji Abri
 
Vol 2, No 1 (2013) Construction Efficiency of the Elliptic Curve Cryptosystem using Code Computing for Amazigh Alphabet Abstract   PDF
Fatima Amounas, El Hassan El Kinani
 
Vol 1, No 1 (2012) Developing a Secure Programming Module to cope with Modern Vulnerabilities Abstract   PDF
Nigel McKelvey
 
Vol 1, No 4 (2012) Effective Performance of Dynamic Source Routing Protocol on Random Waypoint Model (RWM) Using CBR Abstract   PDF
Jogendra Kumar
 
Vol 1, No 3 (2012) Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC Abstract   PDF
FATIMA AMOUNAS, EL HASSAN EL KINANI
 
Vol 1, No 4 (2012) Evaluation of Field Phishing Study Setup Method Abstract   PDF
Yunsang Oh, Takashi Obi
 
Vol 2, No 1 (2013) Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO) Abstract   PDF
Arindam Sarkar, Jyotsna Kumar Mandal
 
Vol 1, No 4 (2012) Face Recognition using Tchebichef Moments Abstract   PDF
D. Sridhar, I. V. Murali Krishna
 
Vol 1, No 2 (2012) Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography Abstract   PDF
FATIMA AMOUNAS, EL HASSAN EL KINANI
 
Vol 1, No 2 (2012) GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver Abstract   PDF
Abdellah El Abbous, Omar Benarchid, Naoufal Raissouni, Samir El Adib, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab
 
1 - 25 of 51 Items 1 2 3 > >>