Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Network and Information Security

ISSN: 2074--9090
Publisher: MECS Publisher


ADD TO MY LIST
 
Improved Trial Division Technique for Primality Checking in RSA Algorithm

Author(s): Kumarjit Banerjee | Satyendra Nath Mandal | Sanjoy Kumar Das
Volume: 5
Issue: 9
Year: 2013
Method and System for Protection of Automated Control Systems for “Smart Buildings”

Author(s): Dmitry Mikhaylov | Igor Zhukov | Andrey Starikovskiy | Alexander Zuykov | Anastasia Tolstaya | Maxim Fomin
Volume: 5
Issue: 9
Year: 2013
Analysis of Reconfigurable Processors Using Petri Net

Author(s): Hadis Heidari
Volume: 5
Issue: 9
Year: 2013
A Genetic Algorithm Inspired Load Balancing Protocol for Congestion Control in Wireless Sensor Networks using Trust Based Routing Framework (GACCTR)

Author(s): Arnab Raha | Mrinal Kanti Naskar | Avishek Paul | Arpita Chakraborty | Anupam Karmakar
Volume: 5
Issue: 9
Year: 2013
Mobile Localization Based on Clustering

Author(s): Malika BELKADI | Rachida AOUDJIT | Mehammed DAOUI | Mustapha LALAM
Volume: 5
Issue: 9
Year: 2013
Improved Trial Division Technique for Primality Checking in RSA Algorithm

Author(s): Kumarjit Banerjee | Satyendra Nath Mandal | Sanjoy Kumar Das
Volume: 5
Issue: 9
Year: 2012
Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation

Author(s): Awadhesh Kumar | Prabhat Singh | Vinay Kumar | Neeraj Tyagi
Volume: 5
Issue: 9
Year: 2013
Video Forensics in Temporal Domain using Machine Learning Techniques

Author(s): Sunil Jaiswal | Sunita Dhavale
Volume: 5
Issue: 9
Year: 2013
Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers

Author(s): M. Milton Joe | R.S. Shaji | K. Ashok Kumar
Volume: 5
Issue: 8
Year: 2013
Information Leakage Prevention Using Virtual Disk Drive

Author(s): Tarek S. Sobh
Volume: 5
Issue: 8
Year: 2013
MUSIC 2D-DOA Estimation using Split Vertical Linear and Circular Arrays

Author(s): Yasser Albagory | Amira Ashour
Volume: 5
Issue: 8
Year: 2013
Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP

Author(s): Mehajabeen Fatima | Roopam Gupta | T.K.Bandhopadhyay
Volume: 5
Issue: 8
Year: 2013
A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer

Author(s): Maria Sebastian | Arun Raj Kumar P.
Volume: 5
Issue: 8
Year: 2013
GSM Base Stations Location Monitoring using Geographic Information System

Author(s): Kuboye B. M. | Dada O. A. | Akinwonmi F. C.
Volume: 5
Issue: 8
Year: 2013
Analysis of the SYN Flood DoS Attack

Author(s): Mitko Bogdanoski | Tomislav Shuminoski | Aleksandar Risteski
Volume: 5
Issue: 8
Year: 2013
Geographic Load Balanced Routing in Wireless Sensor Networks

Author(s): Robin Guleria | Ankit Kumar Jain
Volume: 5
Issue: 8
Year: 2013
Flat-Top Ring-Shaped Cell Design for High-Altitude Platform Communications

Author(s): Yasser Albagory
Volume: 5
Issue: 7
Year: 2013
Image Encryption based on the RGB PIXEL Transposition and Shuffling

Author(s): Quist Aphetsi Kester
Volume: 5
Issue: 7
Year: 2013
A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks

Author(s): Rafi U Zaman | Khaleel ur Rahman Khan | A.Venugopal Reddy
Volume: 5
Issue: 7
Year: 2013
A New Proposal for Route Finding in Mobile AdHoc Networks

Author(s): H.Vignesh Ramamoorthy | D.Suganya Devi
Volume: 5
Issue: 7
Year: 2013
Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey

Author(s): Joyce Jose | M. Princy | Josna Jose
Volume: 5
Issue: 7
Year: 2013
Wi-Fi Networks Security and Accessing Control

Author(s): Tarek S. Sobh
Volume: 5
Issue: 7
Year: 2013
Social Networking for Botnet Command and Control

Author(s): Ashutosh Singh | Annie H. Toderici | Kevin Ross | Mark Stamp
Volume: 5
Issue: 6
Year: 2013
A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

Author(s): S. M. Chadchan | C. B. Akki
Volume: 5
Issue: 6
Year: 2013
Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure

Author(s): Ritu Garg | Awadhesh Kumar Singh
Volume: 5
Issue: 6
Year: 2013
Password Hardened Biometric: A Complete Solution of Online Security

Author(s): Ajay Sharma | Deo Brat Ojha
Volume: 5
Issue: 6
Year: 2013
Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

Author(s): Smita Parija | Santosh Kumar Nanda | Prasanna Kumar Sahu | Sudhansu Sekhar Singh
Volume: 5
Issue: 6
Year: 2013
A Robust Fault Detection Scheme for the Advanced Encryption Standard

Author(s): Hassen Mestiri | Noura Benhadjyoussef | Mohsen Machhout | Rached Tourki
Volume: 5
Issue: 6
Year: 2013
Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

Author(s): P. Mabin Joseph | J. Rajan | K.K. Kuriakose | S.A.V. Satya Murty
Volume: 5
Issue: 6
Year: 2013
A Bespoke Technique for Secret Messaging

Author(s): Mahimn Pandya | Hiren Joshi | Ashish Jani
Volume: 5
Issue: 5
Year: 2013
Criteria Specifications for the Comparison and Evaluation of Access Control Models

Author(s): Shabnam Mohammad Hasani | Nasser Modiri
Volume: 5
Issue: 5
Year: 2013
Effect of Black Hole Attack on MANET Routing Protocols

Author(s): Jaspal Kumar | M. Kulkarni | Daya Gupta
Volume: 5
Issue: 5
Year: 2013
Biometric Passport Validation Scheme using Radio Frequency Identification

Author(s): V.K. Narendira Kumar | B. Srinivasan
Volume: 5
Issue: 5
Year: 2013
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System

Author(s): G.Velmayil | S.Pannirselvam
Volume: 5
Issue: 5
Year: 2013
The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity

Author(s): Shafi’í Muhammad Abdulhamid | Olawale Surajudeen Adebayo | Damian Oshomah Ugiomoh | Mohammed Danlami AbdulMalik
Volume: 5
Issue: 5
Year: 2013
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals

Author(s): Zhukov Igor | Mikhaylov Dmitry | Starikovskiy Andrey | Kuznetsov Dmitry | Tolstaya Anastasia | Zuykov Alexander
Volume: 5
Issue: 5
Year: 2013
Recent Replica Placement Algorithms in P2P Networks – A Review

Author(s): Kala Karun. A | Jayasudha. J. S
Volume: 5
Issue: 5
Year: 2013
QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks

Author(s): Sanjay Kumar | Mayank Dave | Surender Dahiya
Volume: 5
Issue: 4
Year: 2013
Formal Verification of Congestion Control Algorithm in VANETs

Author(s): Mohamad Yusof Darus | Kamalrulnizam Abu Bakar
Volume: 5
Issue: 4
Year: 2013
A Novel Routing Scheme for Mobile Ad Hoc Network

Author(s): Prem Chand | M.K.Soni
Volume: 5
Issue: 4
Year: 2013
Omni Directional Antenna Assisted Scheme to Minimize Redundancy in Wireless Sensor Networks

Author(s): Tarun Dubey | O.P. Sahu
Volume: 5
Issue: 4
Year: 2013
3-Level Heterogeneity Model for Wireless Sensor Networks

Author(s): Satish Chand | Samayveer Singh | Bijendra Kumar
Volume: 5
Issue: 4
Year: 2013
A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks

Author(s): CH. V. Raghavendran | G. Naga Satish | P. Suresh Varma
Volume: 5
Issue: 4
Year: 2013
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

Author(s): Alawi A. Al-Saggaf | Haridas Acharya
Volume: 5
Issue: 4
Year: 2013
Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

Author(s): Ibrahim S. I. Abuhaiba | Huda B. Hubboub
Volume: 5
Issue: 3
Year: 2013
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Rapperswil
Tango Rapperswil