|
Issue |
Title |
|
Vol 1, No 1 (2012) |
Developing a Secure Programming Module to cope with Modern Vulnerabilities |
Abstract
PDF
|
Nigel McKelvey |
|
Vol 2, No 2 (2013) |
Directional Antenna Assisted Scheme to Reduce Localization Error in Wireless Sensor Networks |
Abstract
PDF
|
Tarun Dubey, O. P. Sahu |
|
Vol 1, No 4 (2012) |
Effective Performance of Dynamic Source Routing Protocol on Random Waypoint Model (RWM) Using CBR |
Abstract
PDF
|
Jogendra Kumar |
|
Vol 3, No 6 (2014) |
Efficient Aggregate Proxy Signature Scheme in ID-based Framework |
Abstract
PDF
|
P. V.S.S.N. Gopal, P. Vasudeva Reddy, T. Gowri |
|
Vol 2, No 4 (2013) |
Efficient Local Broadcasting in Wireless Ad Hoc Networks Using Dynamic Approach |
Abstract
PDF
|
R. Madhanmohan, K. Parkavi |
|
Vol 1, No 3 (2012) |
Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC |
Abstract
PDF
|
FATIMA AMOUNAS, EL HASSAN EL KINANI |
|
Vol 2, No 3 (2013) |
Energy Efficient Approach to Target Localisation in Wireless Sensor Networks |
Abstract
PDF
|
Hesham Zarief Badr, Gamal A. F. M. Khalaf |
|
Vol 2, No 4 (2013) |
Energy Efficient LEACH Protocol for Wireless Sensor Network |
Abstract
PDF
|
Nishi Sharma, Vandna Verma |
|
Vol 2, No 3 (2013) |
Enhanced 4-way Handshake Process in IEEE802.11i with Cookies |
Abstract
PDF
|
Hemraj Saini, Kapil Dev Sharma, Pankaj Dadheech Author, T. C. Panda |
|
Vol 1, No 4 (2012) |
Evaluation of Field Phishing Study Setup Method |
Abstract
PDF
|
Yunsang Oh, Takashi Obi |
|
Vol 2, No 1 (2013) |
Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO) |
Abstract
PDF
|
Arindam Sarkar, Jyotsna Kumar Mandal |
|
Vol 1, No 4 (2012) |
Face Recognition using Tchebichef Moments |
Abstract
PDF
|
D. Sridhar, I. V. Murali Krishna |
|
Vol 1, No 2 (2012) |
Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography |
Abstract
PDF
|
FATIMA AMOUNAS, EL HASSAN EL KINANI |
|
Vol 3, No 5 (2014) |
Feature Selection Algorithms for Wireless Sensor Networks |
Abstract
PDF
|
Alaa Eisa Mohammed, Hazem M. El-Bakry, Mamoon H. Mamoon, Samir Zaid |
|
Vol 3, No 4 (2014) |
Formal Verification Of A Shopping Basket Application Model Using PRISM |
Abstract
PDF
|
Patrick Mukala |
|
Vol 3, No 5 (2014) |
Foundational Imperatives for Process Mining Learning Patterns in Floss Repositories |
Abstract
PDF
|
Patrick Mukala |
|
Vol 1, No 2 (2012) |
GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver |
Abstract
PDF
|
Abdellah El Abbous, Omar Benarchid, Naoufal Raissouni, Samir El Adib, Asaad Chahboun, Abdelilah Azyat, Mohammed Lahraoua, Nizar Ben Achhab |
|
Vol 4, No 1 (2015) |
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing |
Abstract
PDF
|
Prakash G L, Dr. Manish Prateek, Dr. Inder Singh |
|
Vol 3, No 3 (2014) |
GreedyAdapter: Flexible Web Content Adaptation for Mobile Devices |
Abstract
PDF
|
Rajibul Anam, Chin Kuan Ho, Tek Yong Lim |
|
Vol 2, No 2 (2013) |
Hierarchical Wireless Mesh Networks Scalable Secure Framework |
Abstract
PDF
|
K. Ganesh Reddy, P. Santi Thilagam |
|
Vol 3, No 1 (2014) |
How to Ensure the European Union Security |
Abstract
PDF
|
Dana Prochazkova |
|
Vol 2, No 1 (2013) |
Identifying Phishing Threats in Government Web Services |
Abstract
PDF
|
Yunsang Oh, Takashi Obi |
|
Vol 3, No 6 (2014) |
Identity Based Authenticated Key Agreement for MANET |
Abstract
PDF
|
Shaheena Khatoon, Balwant Singh Thakur, Birendra Kumar Sharma |
|
Vol 1, No 1 (2012) |
Improved G-3PAKE Protocol with Formal Verification |
Abstract
PDF
|
H. K. Pathak, Manju Sanghi |
|
Vol 2, No 3 (2013) |
Intelligent Driver Mobility Model and Traffic Pattern Generation based Optimization of Reactive Protocols for Vehicular Ad-hoc Networks |
Abstract
PDF
|
Vaibhav Godbole |
|
51 - 75 of 131 Items |
<< < 1 2 3 4 5 6 > >> |