| Issue | Title | |
| Vol 3, No 6 (2014) | An Efficient Dynamic Prevention Technique for TCP/IP DDoS Attacks over MANETs | Abstract PDF |
| Mohammed J. Bawatneh | ||
| Vol 1, No 3 (2012) | An Efficient ID-Based Proxy Signcryption Scheme | Abstract PDF |
| G. Swapna, P.V.S.S.N. Gopal, T. Gowri, P. Vasudeva Reddy | ||
| Vol 2, No 1 (2013) | An Efficient RSA Cryptosystem with BM-PRIME Method | Abstract PDF |
| Sushma Pradhan, Birendra Kumar Sharma | ||
| Vol 2, No 3 (2013) | An Efficient Signcryption Scheme based on The Elliptic Curve Discrete Logarithm Problem | Abstract PDF |
| F. Amounas, H. Sadki, E. H. El Kinani | ||
| Vol 3, No 1 (2014) | An Elliptic Curve Based Multi-Signature Scheme For Wireless Network | Abstract PDF |
| Manoj Kumar Chande, Balwant Singh Thakur | ||
| Vol 2, No 6 (2013) | An Empirical Evaluation of AriDeM using Matrix Multiplication | Abstract PDF |
| Patrick Mukala | ||
| Vol 3, No 6 (2014) | An Improved Anonymous Multi-Server Remote User Authentication Scheme using Smart Card | Abstract PDF |
| Subhasish Banerjee, Manash Pratim Dutta, C. T. Bhunia | ||
| Vol 2, No 6 (2013) | An Object-Oriented Approach To Generate Java Code From Hierarchical-Concurrent and HistoryStates | Abstract PDF |
| M. H. Aabidi, A. Jakimi, E. H. El Kinani | ||
| Vol 2, No 1 (2013) | An Optimal Sinsing Algorithm for Multiband Cognitive Radio Network | Abstract PDF |
| Gamal A. F. M. Khalaf | ||
| Vol 3, No 1 (2014) | Antenna Design for UHF RFID Tags Using Two Coupled Patches | Abstract PDF |
| Anas SOFI, Khalid ROKY, Ibrahim HADJ BARAKA | ||
| Vol 3, No 3 (2014) | Arithmetic Deduction Model for High Performance Computing: A Comparative Exploration of Computational Models Paradigms | Abstract PDF |
| Patrick Mukala | ||
| Vol 1, No 4 (2012) | Attack on Fully Homomorphic Encryption over the Integers | Abstract PDF |
| Gu Chun-sheng | ||
| Vol 2, No 5 (2013) | Automated Identification Technology and Information Security in Digital Hospitals | Abstract PDF |
| Lidong Wang, Cheryl Ann Alexander | ||
| Vol 3, No 1 (2014) | Automatic Feature Extraction, Categorization and Detection of Malicious Code in Android Applications | Abstract PDF |
| Muhammad Zuhair Qadir, Atif Nisar Jilani, Hassam Ullah Sheikh | ||
| Vol 2, No 5 (2013) | BER Analysis in Multi-Carrier CDMA Systems over Rayleigh Fading | Abstract PDF |
| M. F. Ghanim, M. F. L. Abdullah, A. Z. Yonis | ||
| Vol 1, No 3 (2012) | Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM) | Abstract PDF |
| Jogendra Kumar | ||
| Vol 1, No 3 (2012) | Client Side CSRF Defensive Tool | Abstract PDF |
| Rupali D. Kombade, B.B. Meshram | ||
| Vol 2, No 2 (2013) | Codes Correcting Blockwise s-Periodic Errors | Abstract PDF |
| P. K. Das, Vinod Tyagi | ||
| Vol 1, No 3 (2012) | Compact and Integrated Routing Photonic Crystals Structures Design Using the Two-dimensional FDTD Method | Abstract PDF |
| Hadjira Badaoui, Mohammed Feham, Mehadji Abri | ||
| Vol 3, No 2 (2014) | Comparison of Upgrading Infrastructure Optimal in Next Generation Wireless Network using GA and ACO techniques | Abstract PDF |
| Dac-Nhuong Le | ||
| Vol 2, No 1 (2013) | Construction Efficiency of the Elliptic Curve Cryptosystem using Code Computing for Amazigh Alphabet | Abstract PDF |
| Fatima Amounas, El Hassan El Kinani | ||
| Vol 2, No 2 (2013) | Creating enhanced Wikileaks | Abstract PDF |
| Amr Galal, Hesham Hassan | ||
| Vol 3, No 1 (2014) | DCT Difference Modulation(DCTDM) Image Steganography | Abstract PDF |
| Souvik Bhattacharyya, Aparajita Khan, Gautam Sanyal | ||
| Vol 3, No 3 (2014) | DDoS Attack Defense in Next Generation Networks using Private Security Policy | Abstract PDF |
| Dac- Nhuong Le | ||
| Vol 2, No 2 (2013) | Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks | Abstract PDF |
| I. Diana Jeba Jingle, Elijah Blessing Rajsingh | ||
| 26 - 50 of 131 Items | << < 1 2 3 4 5 6 > >> | |
