|
Issue |
Title |
|
Vol 3, No 6 (2014) |
An Efficient Dynamic Prevention Technique for TCP/IP DDoS Attacks over MANETs |
Abstract
PDF
|
Mohammed J. Bawatneh |
|
Vol 1, No 3 (2012) |
An Efficient ID-Based Proxy Signcryption Scheme |
Abstract
PDF
|
G. Swapna, P.V.S.S.N. Gopal, T. Gowri, P. Vasudeva Reddy |
|
Vol 2, No 1 (2013) |
An Efficient RSA Cryptosystem with BM-PRIME Method |
Abstract
PDF
|
Sushma Pradhan, Birendra Kumar Sharma |
|
Vol 2, No 3 (2013) |
An Efficient Signcryption Scheme based on The Elliptic Curve Discrete Logarithm Problem |
Abstract
PDF
|
F. Amounas, H. Sadki, E. H. El Kinani |
|
Vol 3, No 1 (2014) |
An Elliptic Curve Based Multi-Signature Scheme For Wireless Network |
Abstract
PDF
|
Manoj Kumar Chande, Balwant Singh Thakur |
|
Vol 2, No 6 (2013) |
An Empirical Evaluation of AriDeM using Matrix Multiplication |
Abstract
PDF
|
Patrick Mukala |
|
Vol 3, No 6 (2014) |
An Improved Anonymous Multi-Server Remote User Authentication Scheme using Smart Card |
Abstract
PDF
|
Subhasish Banerjee, Manash Pratim Dutta, C. T. Bhunia |
|
Vol 2, No 6 (2013) |
An Object-Oriented Approach To Generate Java Code From Hierarchical-Concurrent and HistoryStates |
Abstract
PDF
|
M. H. Aabidi, A. Jakimi, E. H. El Kinani |
|
Vol 2, No 1 (2013) |
An Optimal Sinsing Algorithm for Multiband Cognitive Radio Network |
Abstract
PDF
|
Gamal A. F. M. Khalaf |
|
Vol 3, No 1 (2014) |
Antenna Design for UHF RFID Tags Using Two Coupled Patches |
Abstract
PDF
|
Anas SOFI, Khalid ROKY, Ibrahim HADJ BARAKA |
|
Vol 3, No 3 (2014) |
Arithmetic Deduction Model for High Performance Computing: A Comparative Exploration of Computational Models Paradigms |
Abstract
PDF
|
Patrick Mukala |
|
Vol 1, No 4 (2012) |
Attack on Fully Homomorphic Encryption over the Integers |
Abstract
PDF
|
Gu Chun-sheng |
|
Vol 2, No 5 (2013) |
Automated Identification Technology and Information Security in Digital Hospitals |
Abstract
PDF
|
Lidong Wang, Cheryl Ann Alexander |
|
Vol 3, No 1 (2014) |
Automatic Feature Extraction, Categorization and Detection of Malicious Code in Android Applications |
Abstract
PDF
|
Muhammad Zuhair Qadir, Atif Nisar Jilani, Hassam Ullah Sheikh |
|
Vol 2, No 5 (2013) |
BER Analysis in Multi-Carrier CDMA Systems over Rayleigh Fading |
Abstract
PDF
|
M. F. Ghanim, M. F. L. Abdullah, A. Z. Yonis |
|
Vol 1, No 3 (2012) |
Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM) |
Abstract
PDF
|
Jogendra Kumar |
|
Vol 1, No 3 (2012) |
Client Side CSRF Defensive Tool |
Abstract
PDF
|
Rupali D. Kombade, B.B. Meshram |
|
Vol 2, No 2 (2013) |
Codes Correcting Blockwise s-Periodic Errors |
Abstract
PDF
|
P. K. Das, Vinod Tyagi |
|
Vol 1, No 3 (2012) |
Compact and Integrated Routing Photonic Crystals Structures Design Using the Two-dimensional FDTD Method |
Abstract
PDF
|
Hadjira Badaoui, Mohammed Feham, Mehadji Abri |
|
Vol 3, No 2 (2014) |
Comparison of Upgrading Infrastructure Optimal in Next Generation Wireless Network using GA and ACO techniques |
Abstract
PDF
|
Dac-Nhuong Le |
|
Vol 2, No 1 (2013) |
Construction Efficiency of the Elliptic Curve Cryptosystem using Code Computing for Amazigh Alphabet |
Abstract
PDF
|
Fatima Amounas, El Hassan El Kinani |
|
Vol 2, No 2 (2013) |
Creating enhanced Wikileaks |
Abstract
PDF
|
Amr Galal, Hesham Hassan |
|
Vol 3, No 1 (2014) |
DCT Difference Modulation(DCTDM) Image Steganography |
Abstract
PDF
|
Souvik Bhattacharyya, Aparajita Khan, Gautam Sanyal |
|
Vol 3, No 3 (2014) |
DDoS Attack Defense in Next Generation Networks using Private Security Policy |
Abstract
PDF
|
Dac- Nhuong Le |
|
Vol 2, No 2 (2013) |
Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks |
Abstract
PDF
|
I. Diana Jeba Jingle, Elijah Blessing Rajsingh |
|
26 - 50 of 131 Items |
<< < 1 2 3 4 5 6 > >> |