Browse Title Index


 
Issue Title
 
Vol 1, No 3 (2012) A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications Abstract   PDF
M. ABRI, H. BADAOUI, Z. BERBER
 
Vol 3, No 3 (2014) A Cognitive Network-Based Network Security Architecture for Mission Critical Communications Abstract   PDF
Anssi Kärkkäinen
 
Vol 2, No 4 (2013) A Comparatives Study of Gateway Placement Optimization in Wireless Mesh Network using GA, PSO and ACO Abstract   PDF
Dac-Nhuong Le
 
Vol 1, No 2 (2012) A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model Abstract   PDF
Anubhav Chitrey, Dharmendra Singh, Monark Bag, Vrijendra Singh
 
Vol 2, No 5 (2013) A Cooperative Trust Management System for VANET Integrating WSN Technology Abstract   PDF
Amel LTIFI, Ahmed ZOUINKHI, Mohamed Salim BOUHLEL
 
Vol 3, No 5 (2014) A Data Mining Approach for Predicting Attacks and Recognizing Threat Strategy in the context of Collaborative Attackers and Network Security Management Abstract   PDF
Oluwafemi Oriola, Adesesan Barnabas Adeyemo, Oluwaseyitanfumi Osunade
 
Vol 3, No 4 (2014) A Faster and Efficient Image Encryption Algorithm Using Color Object, Byte Confusion and Diffusion Abstract   PDF
Parameswaran Bose
 
Vol 3, No 3 (2014) A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Abstract   PDF
TONG Xin, BAN Xiaofang
 
Vol 2, No 4 (2013) A Modified Variant of RSA Algorithm for Gaussian Integers Abstract   PDF
Sushma Pradhan, Birendra Kumar Sharma
 
Vol 2, No 2 (2013) A New Genetic Algorithm for the Optimal Centralized Wireless Access Network Abstract   PDF
Dac-Nhuong Le
 
Vol 1, No 2 (2012) A New Proxy Blind Signature Scheme Based on DLP Abstract   PDF
Swati Verma, Birendra Kumar Sharma
 
Vol 1, No 3 (2012) A New Signature Scheme Based on Factoring and Discrete Logarithm Problems Abstract   PDF
Swati Verma, Birendra Kumar Sharma
 
Vol 2, No 4 (2013) A Novel Approach for Enciphering Data based ECC using Catalan Numbers Abstract   PDF
F. Amounas, E. H. El Kinani, M. Hajar
 
Vol 3, No 2 (2014) A Novel Approach of Amazigh Text Steganography based Elliptic Curve Abstract   PDF
Hassain Sadki, Fatima Amounas, El Hassan El Kinani
 
Vol 2, No 2 (2013) A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin ½ Matrices Abstract   PDF
F. Amounas, E. H. El Kinani
 
Vol 2, No 6 (2013) A Novel Priority-Based Path Computation Approach for Finding Domain Sequences in PCE-Based Multi-domain Networks Abstract   PDF
Fatemeh Banaie, Mohammad Hosein Yaghmaee Moghadam
 
Vol 1, No 1 (2012) A Password attack on S-3 PAKE Protocol Abstract   PDF
SHIRISHA TALLAPALLY
 
Vol 1, No 2 (2012) A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael Abstract   PDF
Samir El Adib, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab, Abdellah El Abbous, Omar Benarchid
 
Vol 3, No 2 (2014) A Survey On Real World Botnets And Detection Mechanisms Abstract   PDF
Somayeh Soltani, Seyed Amin Hosseini Seno, Maryam Nezhadkamali, Rahmat Budirato
 
Vol 2, No 4 (2013) A Theoretical Model of Multi-user QKD Network as the Extension of E91 Protocol Abstract   PDF
Vikas Jha, Pankaj Srivastava
 
Vol 3, No 1 (2014) A Tool to Analyze Symmetric Key Algorithms Abstract   PDF
T. D. B Weerasinghe
 
Vol 1, No 2 (2012) A Trust Based Approach For Secure Access Control In Information Centric Network Abstract   PDF
Sapna Singh, Archana Puri, Shiksha Smreti Singh, Anurika Vaish, S. Venkatesan
 
Vol 1, No 2 (2012) AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization Abstract   PDF
Samir El Adib, Naoufal Raissouni
 
Vol 2, No 3 (2013) Algorithm to Detect Spurious Communications in Vehicular Ad hoc Networks Abstract   PDF
Muhammad Aamir, Shabbir Mukhi
 
Vol 2, No 2 (2013) An Architecture of Hybrid Intrusion Detection System Abstract   PDF
Kanubhai K. Patel, Bharat V. Buddhadev
 
1 - 25 of 131 Items 1 2 3 4 5 6 > >>