- DokumentPattern Based Network Security Using Semi-Supervised Learninghochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentBroadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM)hochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentElliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECChochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentA Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applicationshochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentAn Efficient ID-Based Proxy Signcryption Schemehochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentPerformance Evaluation of UWB Wireless Linkhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentCompact and Integrated Routing Photonic Crystals Structures Design Using the Two-dimensional FDTD Methodhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentClient Side CSRF Defensive Toolhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentNovel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwordshochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentA New Signature Scheme Based on Factoring and Discrete Logarithm Problemshochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentPerformance Analysis of Load Minimization In AODV and FSRhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentMobile Geographic Information System Platform (MGISP)hochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentGPS signal accuracy and coverage analysis platformhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentA Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndaelhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentAES Encryption Algorithm Hardware Implementation Architecturehochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentReview on Attack and Defense in Torhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentA Trust Based Approach For Secure Access Control In Information Centric Networkhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentPeak-Throughput of LTE-Release 10 for Up/Down Link Physical Layerhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentSecrecy and Performance Analysis of Symmetric Key Encryption Algorithmshochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentSD-AREEhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentA New Proxy Blind Signature Scheme Based on DLPhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentFast Mapping Method based on Matrix Approach For Elliptic Curve Cryptographyhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentA Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Modelhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentDeveloping a Secure Programming Module to cope with Modern Vulnerabilitieshochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentA Password attack on S-3 PAKE Protocolhochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentSynthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costshochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentThe Transmission Multicast and The Control of QoS For IPv 6 Using The Infrastructure MPLShochgeladen vonInternational Journal of Information and Network Security (IJINS)
- DokumentImproved G-3PAKE Protocol with Formal Verificationhochgeladen vonInternational Journal of Information and Network Security (IJINS)