|
Issue |
Title |
|
Vol 1, No 3 (2012) |
A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications |
Abstract
PDF
|
M. ABRI, H. BADAOUI, Z. BERBER |
|
Vol 3, No 3 (2014) |
A Cognitive Network-Based Network Security Architecture for Mission Critical Communications |
Abstract
PDF
|
Anssi Kärkkäinen |
|
Vol 2, No 4 (2013) |
A Comparatives Study of Gateway Placement Optimization in Wireless Mesh Network using GA, PSO and ACO |
Abstract
PDF
|
Dac-Nhuong Le |
|
Vol 1, No 2 (2012) |
A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model |
Abstract
PDF
|
Anubhav Chitrey, Dharmendra Singh, Monark Bag, Vrijendra Singh |
|
Vol 2, No 5 (2013) |
A Cooperative Trust Management System for VANET Integrating WSN Technology |
Abstract
PDF
|
Amel LTIFI, Ahmed ZOUINKHI, Mohamed Salim BOUHLEL |
|
Vol 3, No 5 (2014) |
A Data Mining Approach for Predicting Attacks and Recognizing Threat Strategy in the context of Collaborative Attackers and Network Security Management |
Abstract
PDF
|
Oluwafemi Oriola, Adesesan Barnabas Adeyemo, Oluwaseyitanfumi Osunade |
|
Vol 3, No 4 (2014) |
A Faster and Efficient Image Encryption Algorithm Using Color Object, Byte Confusion and Diffusion |
Abstract
PDF
|
Parameswaran Bose |
|
Vol 3, No 3 (2014) |
A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain |
Abstract
PDF
|
TONG Xin, BAN Xiaofang |
|
Vol 2, No 4 (2013) |
A Modified Variant of RSA Algorithm for Gaussian Integers |
Abstract
PDF
|
Sushma Pradhan, Birendra Kumar Sharma |
|
Vol 2, No 2 (2013) |
A New Genetic Algorithm for the Optimal Centralized Wireless Access Network |
Abstract
PDF
|
Dac-Nhuong Le |
|
Vol 1, No 2 (2012) |
A New Proxy Blind Signature Scheme Based on DLP |
Abstract
PDF
|
Swati Verma, Birendra Kumar Sharma |
|
Vol 1, No 3 (2012) |
A New Signature Scheme Based on Factoring and Discrete Logarithm Problems |
Abstract
PDF
|
Swati Verma, Birendra Kumar Sharma |
|
Vol 2, No 4 (2013) |
A Novel Approach for Enciphering Data based ECC using Catalan Numbers |
Abstract
PDF
|
F. Amounas, E. H. El Kinani, M. Hajar |
|
Vol 3, No 2 (2014) |
A Novel Approach of Amazigh Text Steganography based Elliptic Curve |
Abstract
PDF
|
Hassain Sadki, Fatima Amounas, El Hassan El Kinani |
|
Vol 2, No 2 (2013) |
A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin ½ Matrices |
Abstract
PDF
|
F. Amounas, E. H. El Kinani |
|
Vol 2, No 6 (2013) |
A Novel Priority-Based Path Computation Approach for Finding Domain Sequences in PCE-Based Multi-domain Networks |
Abstract
PDF
|
Fatemeh Banaie, Mohammad Hosein Yaghmaee Moghadam |
|
Vol 1, No 1 (2012) |
A Password attack on S-3 PAKE Protocol |
Abstract
PDF
|
SHIRISHA TALLAPALLY |
|
Vol 1, No 2 (2012) |
A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael |
Abstract
PDF
|
Samir El Adib, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab, Abdellah El Abbous, Omar Benarchid |
|
Vol 3, No 2 (2014) |
A Survey On Real World Botnets And Detection Mechanisms |
Abstract
PDF
|
Somayeh Soltani, Seyed Amin Hosseini Seno, Maryam Nezhadkamali, Rahmat Budirato |
|
Vol 2, No 4 (2013) |
A Theoretical Model of Multi-user QKD Network as the Extension of E91 Protocol |
Abstract
PDF
|
Vikas Jha, Pankaj Srivastava |
|
Vol 3, No 1 (2014) |
A Tool to Analyze Symmetric Key Algorithms |
Abstract
PDF
|
T. D. B Weerasinghe |
|
Vol 1, No 2 (2012) |
A Trust Based Approach For Secure Access Control In Information Centric Network |
Abstract
PDF
|
Sapna Singh, Archana Puri, Shiksha Smreti Singh, Anurika Vaish, S. Venkatesan |
|
Vol 1, No 2 (2012) |
AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization |
Abstract
PDF
|
Samir El Adib, Naoufal Raissouni |
|
Vol 2, No 3 (2013) |
Algorithm to Detect Spurious Communications in Vehicular Ad hoc Networks |
Abstract
PDF
|
Muhammad Aamir, Shabbir Mukhi |
|
Vol 2, No 2 (2013) |
An Architecture of Hybrid Intrusion Detection System |
Abstract
PDF
|
Kanubhai K. Patel, Bharat V. Buddhadev |
|
1 - 25 of 131 Items |
1 2 3 4 5 6 > >> |