Browse Title Index


 
Issue Title
 
Vol 1, No 1 (2012) Developing a Secure Programming Module to cope with Modern Vulnerabilities Abstract   PDF
Nigel McKelvey
 
Vol 2, No 2 (2013) Directional Antenna Assisted Scheme to Reduce Localization Error in Wireless Sensor Networks Abstract   PDF
Tarun Dubey, O. P. Sahu
 
Vol 1, No 4 (2012) Effective Performance of Dynamic Source Routing Protocol on Random Waypoint Model (RWM) Using CBR Abstract   PDF
Jogendra Kumar
 
Vol 3, No 6 (2014) Efficient Aggregate Proxy Signature Scheme in ID-based Framework Abstract   PDF
P. V.S.S.N. Gopal, P. Vasudeva Reddy, T. Gowri
 
Vol 2, No 4 (2013) Efficient Local Broadcasting in Wireless Ad Hoc Networks Using Dynamic Approach Abstract   PDF
R. Madhanmohan, K. Parkavi
 
Vol 1, No 3 (2012) Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC Abstract   PDF
FATIMA AMOUNAS, EL HASSAN EL KINANI
 
Vol 2, No 3 (2013) Energy Efficient Approach to Target Localisation in Wireless Sensor Networks Abstract   PDF
Hesham Zarief Badr, Gamal A. F. M. Khalaf
 
Vol 2, No 4 (2013) Energy Efficient LEACH Protocol for Wireless Sensor Network Abstract   PDF
Nishi Sharma, Vandna Verma
 
Vol 2, No 3 (2013) Enhanced 4-way Handshake Process in IEEE802.11i with Cookies Abstract   PDF
Hemraj Saini, Kapil Dev Sharma, Pankaj Dadheech Author, T. C. Panda
 
Vol 1, No 4 (2012) Evaluation of Field Phishing Study Setup Method Abstract   PDF
Yunsang Oh, Takashi Obi
 
Vol 2, No 1 (2013) Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO) Abstract   PDF
Arindam Sarkar, Jyotsna Kumar Mandal
 
Vol 1, No 4 (2012) Face Recognition using Tchebichef Moments Abstract   PDF
D. Sridhar, I. V. Murali Krishna
 
Vol 1, No 2 (2012) Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography Abstract   PDF
FATIMA AMOUNAS, EL HASSAN EL KINANI
 
Vol 3, No 5 (2014) Feature Selection Algorithms for Wireless Sensor Networks Abstract   PDF
Alaa Eisa Mohammed, Hazem M. El-Bakry, Mamoon H. Mamoon, Samir Zaid
 
Vol 3, No 4 (2014) Formal Verification Of A Shopping Basket Application Model Using PRISM Abstract   PDF
Patrick Mukala
 
Vol 3, No 5 (2014) Foundational Imperatives for Process Mining Learning Patterns in Floss Repositories Abstract   PDF
Patrick Mukala
 
Vol 1, No 2 (2012) GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver Abstract   PDF
Abdellah El Abbous, Omar Benarchid, Naoufal Raissouni, Samir El Adib, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab
 
Vol 4, No 1 (2015) Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing Abstract   PDF
Prakash G L, Dr. Manish Prateek, Dr. Inder Singh
 
Vol 3, No 3 (2014) GreedyAdapter: Flexible Web Content Adaptation for Mobile Devices Abstract   PDF
Rajibul Anam, Chin Kuan Ho, Tek Yong Lim
 
Vol 2, No 2 (2013) Hierarchical Wireless Mesh Networks Scalable Secure Framework Abstract   PDF
K. Ganesh Reddy, P. Santi Thilagam
 
Vol 3, No 1 (2014) How to Ensure the European Union Security Abstract   PDF
Dana Prochazkova
 
Vol 2, No 1 (2013) Identifying Phishing Threats in Government Web Services Abstract   PDF
Yunsang Oh, Takashi Obi
 
Vol 3, No 6 (2014) Identity Based Authenticated Key Agreement for MANET Abstract   PDF
Shaheena Khatoon, Balwant Singh Thakur, Birendra Kumar Sharma
 
Vol 1, No 1 (2012) Improved G-3PAKE Protocol with Formal Verification Abstract   PDF
H. K. Pathak, Manju Sanghi
 
Vol 2, No 3 (2013) Intelligent Driver Mobility Model and Traffic Pattern Generation based Optimization of Reactive Protocols for Vehicular Ad-hoc Networks Abstract   PDF
Vaibhav Godbole
 
51 - 75 of 131 Items << < 1 2 3 4 5 6 > >>