| Issue | Title | |
| Vol 1, No 1 (2012) | The Transmission Multicast and The Control of QoS For IPv 6 Using The Infrastructure MPLS | Abstract PDF |
| WAYAWO-MANDATA Augustin, LIU Lan | ||
| Vol 3, No 6 (2014) | The Use of Winnowing Multihashing Method for the Media Capacity Efficiency in Network Forensic Analysis | Abstract PDF |
| Irwan Sembiring, Jazi Eko Istiyanto, Edi Winarko, Ahmad Ashari | ||
| Vol 3, No 3 (2014) | Toward Higher Flexibility of Federated Business Processes with Cloud-based Biometric Authentication Services | Abstract PDF |
| Christian Senk, Florian Obergrusberger, Dieter Bartmann | ||
| Vol 3, No 4 (2014) | Using Steganography to Product a New Message Authentication Code Scheme inside Cloud Environment | Abstract PDF |
| Ali A.Yassin Al-Amrei | ||
| Vol 2, No 1 (2013) | W2BC: A Proposal for a Converged Baseband Implementation | Abstract PDF |
| Ali Al-Sherbaz, Ihsan Lami | ||
| Vol 3, No 4 (2014) | WSNs: Algorithmic Aspects of Topology Control and Maintenance | Abstract PDF |
| Manish Singh, Kuldeep Singh | ||
| 126 - 131 of 131 Items | << < 1 2 3 4 5 6 | |
