Browse Title Index

Issue Title
Vol 3, No 6 (2014) An Efficient Dynamic Prevention Technique for TCP/IP DDoS Attacks over MANETs Abstract   PDF
Mohammed J. Bawatneh
Vol 1, No 3 (2012) An Efficient ID-Based Proxy Signcryption Scheme Abstract   PDF
G. Swapna, P.V.S.S.N. Gopal, T. Gowri, P. Vasudeva Reddy
Vol 2, No 1 (2013) An Efficient RSA Cryptosystem with BM-PRIME Method Abstract   PDF
Sushma Pradhan, Birendra Kumar Sharma
Vol 2, No 3 (2013) An Efficient Signcryption Scheme based on The Elliptic Curve Discrete Logarithm Problem Abstract   PDF
F. Amounas, H. Sadki, E. H. El Kinani
Vol 3, No 1 (2014) An Elliptic Curve Based Multi-Signature Scheme For Wireless Network Abstract   PDF
Manoj Kumar Chande, Balwant Singh Thakur
Vol 2, No 6 (2013) An Empirical Evaluation of AriDeM using Matrix Multiplication Abstract   PDF
Patrick Mukala
Vol 3, No 6 (2014) An Improved Anonymous Multi-Server Remote User Authentication Scheme using Smart Card Abstract   PDF
Subhasish Banerjee, Manash Pratim Dutta, C. T. Bhunia
Vol 2, No 6 (2013) An Object-Oriented Approach To Generate Java Code From Hierarchical-Concurrent and HistoryStates Abstract   PDF
M. H. Aabidi, A. Jakimi, E. H. El Kinani
Vol 2, No 1 (2013) An Optimal Sinsing Algorithm for Multiband Cognitive Radio Network Abstract   PDF
Gamal A. F. M. Khalaf
Vol 3, No 1 (2014) Antenna Design for UHF RFID Tags Using Two Coupled Patches Abstract   PDF
Anas SOFI, Khalid ROKY, Ibrahim HADJ BARAKA
Vol 3, No 3 (2014) Arithmetic Deduction Model for High Performance Computing: A Comparative Exploration of Computational Models Paradigms Abstract   PDF
Patrick Mukala
Vol 1, No 4 (2012) Attack on Fully Homomorphic Encryption over the Integers Abstract   PDF
Gu Chun-sheng
Vol 2, No 5 (2013) Automated Identification Technology and Information Security in Digital Hospitals Abstract   PDF
Lidong Wang, Cheryl Ann Alexander
Vol 3, No 1 (2014) Automatic Feature Extraction, Categorization and Detection of Malicious Code in Android Applications Abstract   PDF
Muhammad Zuhair Qadir, Atif Nisar Jilani, Hassam Ullah Sheikh
Vol 2, No 5 (2013) BER Analysis in Multi-Carrier CDMA Systems over Rayleigh Fading Abstract   PDF
M. F. Ghanim, M. F. L. Abdullah, A. Z. Yonis
Vol 1, No 3 (2012) Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM) Abstract   PDF
Jogendra Kumar
Vol 1, No 3 (2012) Client Side CSRF Defensive Tool Abstract   PDF
Rupali D. Kombade, B.B. Meshram
Vol 2, No 2 (2013) Codes Correcting Blockwise s-Periodic Errors Abstract   PDF
P. K. Das, Vinod Tyagi
Vol 1, No 3 (2012) Compact and Integrated Routing Photonic Crystals Structures Design Using the Two-dimensional FDTD Method Abstract   PDF
Hadjira Badaoui, Mohammed Feham, Mehadji Abri
Vol 3, No 2 (2014) Comparison of Upgrading Infrastructure Optimal in Next Generation Wireless Network using GA and ACO techniques Abstract   PDF
Dac-Nhuong Le
Vol 2, No 1 (2013) Construction Efficiency of the Elliptic Curve Cryptosystem using Code Computing for Amazigh Alphabet Abstract   PDF
Fatima Amounas, El Hassan El Kinani
Vol 2, No 2 (2013) Creating enhanced Wikileaks Abstract   PDF
Amr Galal, Hesham Hassan
Vol 3, No 1 (2014) DCT Difference Modulation(DCTDM) Image Steganography Abstract   PDF
Souvik Bhattacharyya, Aparajita Khan, Gautam Sanyal
Vol 3, No 3 (2014) DDoS Attack Defense in Next Generation Networks using Private Security Policy Abstract   PDF
Dac- Nhuong Le
Vol 2, No 2 (2013) Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks Abstract   PDF
I. Diana Jeba Jingle, Elijah Blessing Rajsingh
26 - 50 of 131 Items << < 1 2 3 4 5 6 > >>