| Issue | Title | |
| Vol 1, No 1 (2012) | Developing a Secure Programming Module to cope with Modern Vulnerabilities | Abstract PDF |
| Nigel McKelvey | ||
| Vol 2, No 2 (2013) | Directional Antenna Assisted Scheme to Reduce Localization Error in Wireless Sensor Networks | Abstract PDF |
| Tarun Dubey, O. P. Sahu | ||
| Vol 1, No 4 (2012) | Effective Performance of Dynamic Source Routing Protocol on Random Waypoint Model (RWM) Using CBR | Abstract PDF |
| Jogendra Kumar | ||
| Vol 3, No 6 (2014) | Efficient Aggregate Proxy Signature Scheme in ID-based Framework | Abstract PDF |
| P. V.S.S.N. Gopal, P. Vasudeva Reddy, T. Gowri | ||
| Vol 2, No 4 (2013) | Efficient Local Broadcasting in Wireless Ad Hoc Networks Using Dynamic Approach | Abstract PDF |
| R. Madhanmohan, K. Parkavi | ||
| Vol 1, No 3 (2012) | Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC | Abstract PDF |
| FATIMA AMOUNAS, EL HASSAN EL KINANI | ||
| Vol 2, No 3 (2013) | Energy Efficient Approach to Target Localisation in Wireless Sensor Networks | Abstract PDF |
| Hesham Zarief Badr, Gamal A. F. M. Khalaf | ||
| Vol 2, No 4 (2013) | Energy Efficient LEACH Protocol for Wireless Sensor Network | Abstract PDF |
| Nishi Sharma, Vandna Verma | ||
| Vol 2, No 3 (2013) | Enhanced 4-way Handshake Process in IEEE802.11i with Cookies | Abstract PDF |
| Hemraj Saini, Kapil Dev Sharma, Pankaj Dadheech Author, T. C. Panda | ||
| Vol 1, No 4 (2012) | Evaluation of Field Phishing Study Setup Method | Abstract PDF |
| Yunsang Oh, Takashi Obi | ||
| Vol 2, No 1 (2013) | Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO) | Abstract PDF |
| Arindam Sarkar, Jyotsna Kumar Mandal | ||
| Vol 1, No 4 (2012) | Face Recognition using Tchebichef Moments | Abstract PDF |
| D. Sridhar, I. V. Murali Krishna | ||
| Vol 1, No 2 (2012) | Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography | Abstract PDF |
| FATIMA AMOUNAS, EL HASSAN EL KINANI | ||
| Vol 3, No 5 (2014) | Feature Selection Algorithms for Wireless Sensor Networks | Abstract PDF |
| Alaa Eisa Mohammed, Hazem M. El-Bakry, Mamoon H. Mamoon, Samir Zaid | ||
| Vol 3, No 4 (2014) | Formal Verification Of A Shopping Basket Application Model Using PRISM | Abstract PDF |
| Patrick Mukala | ||
| Vol 3, No 5 (2014) | Foundational Imperatives for Process Mining Learning Patterns in Floss Repositories | Abstract PDF |
| Patrick Mukala | ||
| Vol 1, No 2 (2012) | GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver | Abstract PDF |
| Abdellah El Abbous, Omar Benarchid, Naoufal Raissouni, Samir El Adib, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab | ||
| Vol 4, No 1 (2015) | Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing | Abstract PDF |
| Prakash G L, Dr. Manish Prateek, Dr. Inder Singh | ||
| Vol 3, No 3 (2014) | GreedyAdapter: Flexible Web Content Adaptation for Mobile Devices | Abstract PDF |
| Rajibul Anam, Chin Kuan Ho, Tek Yong Lim | ||
| Vol 2, No 2 (2013) | Hierarchical Wireless Mesh Networks Scalable Secure Framework | Abstract PDF |
| K. Ganesh Reddy, P. Santi Thilagam | ||
| Vol 3, No 1 (2014) | How to Ensure the European Union Security | Abstract PDF |
| Dana Prochazkova | ||
| Vol 2, No 1 (2013) | Identifying Phishing Threats in Government Web Services | Abstract PDF |
| Yunsang Oh, Takashi Obi | ||
| Vol 3, No 6 (2014) | Identity Based Authenticated Key Agreement for MANET | Abstract PDF |
| Shaheena Khatoon, Balwant Singh Thakur, Birendra Kumar Sharma | ||
| Vol 1, No 1 (2012) | Improved G-3PAKE Protocol with Formal Verification | Abstract PDF |
| H. K. Pathak, Manju Sanghi | ||
| Vol 2, No 3 (2013) | Intelligent Driver Mobility Model and Traffic Pattern Generation based Optimization of Reactive Protocols for Vehicular Ad-hoc Networks | Abstract PDF |
| Vaibhav Godbole | ||
| 51 - 75 of 131 Items | << < 1 2 3 4 5 6 > >> | |
