| Issue | Title | |
| Vol 1, No 3 (2012) | A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications | Abstract PDF |
| M. ABRI, H. BADAOUI, Z. BERBER | ||
| Vol 3, No 3 (2014) | A Cognitive Network-Based Network Security Architecture for Mission Critical Communications | Abstract PDF |
| Anssi Kärkkäinen | ||
| Vol 2, No 4 (2013) | A Comparatives Study of Gateway Placement Optimization in Wireless Mesh Network using GA, PSO and ACO | Abstract PDF |
| Dac-Nhuong Le | ||
| Vol 1, No 2 (2012) | A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model | Abstract PDF |
| Anubhav Chitrey, Dharmendra Singh, Monark Bag, Vrijendra Singh | ||
| Vol 2, No 5 (2013) | A Cooperative Trust Management System for VANET Integrating WSN Technology | Abstract PDF |
| Amel LTIFI, Ahmed ZOUINKHI, Mohamed Salim BOUHLEL | ||
| Vol 3, No 5 (2014) | A Data Mining Approach for Predicting Attacks and Recognizing Threat Strategy in the context of Collaborative Attackers and Network Security Management | Abstract PDF |
| Oluwafemi Oriola, Adesesan Barnabas Adeyemo, Oluwaseyitanfumi Osunade | ||
| Vol 3, No 4 (2014) | A Faster and Efficient Image Encryption Algorithm Using Color Object, Byte Confusion and Diffusion | Abstract PDF |
| Parameswaran Bose | ||
| Vol 3, No 3 (2014) | A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain | Abstract PDF |
| TONG Xin, BAN Xiaofang | ||
| Vol 2, No 4 (2013) | A Modified Variant of RSA Algorithm for Gaussian Integers | Abstract PDF |
| Sushma Pradhan, Birendra Kumar Sharma | ||
| Vol 2, No 2 (2013) | A New Genetic Algorithm for the Optimal Centralized Wireless Access Network | Abstract PDF |
| Dac-Nhuong Le | ||
| Vol 1, No 2 (2012) | A New Proxy Blind Signature Scheme Based on DLP | Abstract PDF |
| Swati Verma, Birendra Kumar Sharma | ||
| Vol 1, No 3 (2012) | A New Signature Scheme Based on Factoring and Discrete Logarithm Problems | Abstract PDF |
| Swati Verma, Birendra Kumar Sharma | ||
| Vol 2, No 4 (2013) | A Novel Approach for Enciphering Data based ECC using Catalan Numbers | Abstract PDF |
| F. Amounas, E. H. El Kinani, M. Hajar | ||
| Vol 3, No 2 (2014) | A Novel Approach of Amazigh Text Steganography based Elliptic Curve | Abstract PDF |
| Hassain Sadki, Fatima Amounas, El Hassan El Kinani | ||
| Vol 2, No 2 (2013) | A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin ½ Matrices | Abstract PDF |
| F. Amounas, E. H. El Kinani | ||
| Vol 2, No 6 (2013) | A Novel Priority-Based Path Computation Approach for Finding Domain Sequences in PCE-Based Multi-domain Networks | Abstract PDF |
| Fatemeh Banaie, Mohammad Hosein Yaghmaee Moghadam | ||
| Vol 1, No 1 (2012) | A Password attack on S-3 PAKE Protocol | Abstract PDF |
| SHIRISHA TALLAPALLY | ||
| Vol 1, No 2 (2012) | A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael | Abstract PDF |
| Samir El Adib, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab, Abdellah El Abbous, Omar Benarchid | ||
| Vol 3, No 2 (2014) | A Survey On Real World Botnets And Detection Mechanisms | Abstract PDF |
| Somayeh Soltani, Seyed Amin Hosseini Seno, Maryam Nezhadkamali, Rahmat Budirato | ||
| Vol 2, No 4 (2013) | A Theoretical Model of Multi-user QKD Network as the Extension of E91 Protocol | Abstract PDF |
| Vikas Jha, Pankaj Srivastava | ||
| Vol 3, No 1 (2014) | A Tool to Analyze Symmetric Key Algorithms | Abstract PDF |
| T. D. B Weerasinghe | ||
| Vol 1, No 2 (2012) | A Trust Based Approach For Secure Access Control In Information Centric Network | Abstract PDF |
| Sapna Singh, Archana Puri, Shiksha Smreti Singh, Anurika Vaish, S. Venkatesan | ||
| Vol 1, No 2 (2012) | AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization | Abstract PDF |
| Samir El Adib, Naoufal Raissouni | ||
| Vol 2, No 3 (2013) | Algorithm to Detect Spurious Communications in Vehicular Ad hoc Networks | Abstract PDF |
| Muhammad Aamir, Shabbir Mukhi | ||
| Vol 2, No 2 (2013) | An Architecture of Hybrid Intrusion Detection System | Abstract PDF |
| Kanubhai K. Patel, Bharat V. Buddhadev | ||
| 1 - 25 of 131 Items | 1 2 3 4 5 6 > >> | |
