Browse Title Index

Issue Title
Vol 1, No 3 (2012) A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications Abstract   PDF
Vol 3, No 3 (2014) A Cognitive Network-Based Network Security Architecture for Mission Critical Communications Abstract   PDF
Anssi Kärkkäinen
Vol 2, No 4 (2013) A Comparatives Study of Gateway Placement Optimization in Wireless Mesh Network using GA, PSO and ACO Abstract   PDF
Dac-Nhuong Le
Vol 1, No 2 (2012) A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model Abstract   PDF
Anubhav Chitrey, Dharmendra Singh, Monark Bag, Vrijendra Singh
Vol 2, No 5 (2013) A Cooperative Trust Management System for VANET Integrating WSN Technology Abstract   PDF
Amel LTIFI, Ahmed ZOUINKHI, Mohamed Salim BOUHLEL
Vol 3, No 5 (2014) A Data Mining Approach for Predicting Attacks and Recognizing Threat Strategy in the context of Collaborative Attackers and Network Security Management Abstract   PDF
Oluwafemi Oriola, Adesesan Barnabas Adeyemo, Oluwaseyitanfumi Osunade
Vol 3, No 4 (2014) A Faster and Efficient Image Encryption Algorithm Using Color Object, Byte Confusion and Diffusion Abstract   PDF
Parameswaran Bose
Vol 3, No 3 (2014) A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Abstract   PDF
TONG Xin, BAN Xiaofang
Vol 2, No 4 (2013) A Modified Variant of RSA Algorithm for Gaussian Integers Abstract   PDF
Sushma Pradhan, Birendra Kumar Sharma
Vol 2, No 2 (2013) A New Genetic Algorithm for the Optimal Centralized Wireless Access Network Abstract   PDF
Dac-Nhuong Le
Vol 1, No 2 (2012) A New Proxy Blind Signature Scheme Based on DLP Abstract   PDF
Swati Verma, Birendra Kumar Sharma
Vol 1, No 3 (2012) A New Signature Scheme Based on Factoring and Discrete Logarithm Problems Abstract   PDF
Swati Verma, Birendra Kumar Sharma
Vol 2, No 4 (2013) A Novel Approach for Enciphering Data based ECC using Catalan Numbers Abstract   PDF
F. Amounas, E. H. El Kinani, M. Hajar
Vol 3, No 2 (2014) A Novel Approach of Amazigh Text Steganography based Elliptic Curve Abstract   PDF
Hassain Sadki, Fatima Amounas, El Hassan El Kinani
Vol 2, No 2 (2013) A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin ½ Matrices Abstract   PDF
F. Amounas, E. H. El Kinani
Vol 2, No 6 (2013) A Novel Priority-Based Path Computation Approach for Finding Domain Sequences in PCE-Based Multi-domain Networks Abstract   PDF
Fatemeh Banaie, Mohammad Hosein Yaghmaee Moghadam
Vol 1, No 1 (2012) A Password attack on S-3 PAKE Protocol Abstract   PDF
Vol 1, No 2 (2012) A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael Abstract   PDF
Samir El Adib, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab, Abdellah El Abbous, Omar Benarchid
Vol 3, No 2 (2014) A Survey On Real World Botnets And Detection Mechanisms Abstract   PDF
Somayeh Soltani, Seyed Amin Hosseini Seno, Maryam Nezhadkamali, Rahmat Budirato
Vol 2, No 4 (2013) A Theoretical Model of Multi-user QKD Network as the Extension of E91 Protocol Abstract   PDF
Vikas Jha, Pankaj Srivastava
Vol 3, No 1 (2014) A Tool to Analyze Symmetric Key Algorithms Abstract   PDF
T. D. B Weerasinghe
Vol 1, No 2 (2012) A Trust Based Approach For Secure Access Control In Information Centric Network Abstract   PDF
Sapna Singh, Archana Puri, Shiksha Smreti Singh, Anurika Vaish, S. Venkatesan
Vol 1, No 2 (2012) AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization Abstract   PDF
Samir El Adib, Naoufal Raissouni
Vol 2, No 3 (2013) Algorithm to Detect Spurious Communications in Vehicular Ad hoc Networks Abstract   PDF
Muhammad Aamir, Shabbir Mukhi
Vol 2, No 2 (2013) An Architecture of Hybrid Intrusion Detection System Abstract   PDF
Kanubhai K. Patel, Bharat V. Buddhadev
1 - 25 of 131 Items 1 2 3 4 5 6 > >>