Comparative Study of AODV and DSR Routing Protocols for MANET: Performance Analysis
Author(s): Nidhi Goyal | Naveen Hemrajani
Volume: 4
Year: 2013



A Condition for Hopf bifurcation to occur in Equations of Lotka-Volterra Type with Delays
Author(s): Chol Kim
Volume: 4
Year: 2013



Solutions of the Schrödinger Equation with Inversely Quadratic Yukawa Plus Mie-Type Potential using Nikiforov – Uvarov Method
Author(s): B. I. Ita
Volume: 4
Year: 2013



Determination of Characteristic Relaxation Times and Their Significance in A Copper Oxide Thin Film
Author(s): Moses E Emetere | Muhammad M Bakeko
Volume: 4
Year: 2013



Parameterized KAM Theorem for Differentiable Hamiltonian Vector Fields without Action-Angle Variables
Author(s): Wu-hwan Jong | Jin-chol Paek
Volume: 4
Year: 2013



A Security Protocol for the Identification and Data Encrypt- Key Management of Secure Mobile Devices
Author(s): Chol-Un Kim | Dok-Jun An | Song Han
Volume: 3
Issue: 1
Year: 2013




An Efficient Bilinear Pairing-Free Certificateless Two-Party Authenticated Key Agreement Protocol in the eCK model
Author(s): Yong-Jin Kim | Yong-Min Kim | Yong-Jin Choe | Hyong-Chol O
Volume: 3
Issue: 1
Year: 2013




A Novel Algorithm to perform Cryptography Operations using Diffie-Hellman Approach and its Applications
Author(s): K. Ramkumar | K. Elangovan
Volume: 3
Issue: 1
Year: 2013




Addition and doubling of points
Author(s): Dragan Vidakovic | Dusko Parezanovic | Jelena Kaljevic
Volume: 3
Issue: 1
Year: 2013




Public key Steganography Using Discrete Cross-Coupled One-Dimensional Chaotic Maps
Author(s): Sodeif Ahadpour | Mahdiyeh Majidpour
Volume: 3
Issue: 1
Year: 2013




A Special Integer Sequence Strongly Connected to the Discrete Logarithm Problem

Author(s): Omar Khadir | Laszlo Szalay
Volume: 2
Issue: 1
Year: 2013





Preparing for a (RSA) Digital Signature

Author(s): Dragan Vidakovic | Jelena Kaljevic | Dusko Parezanovic
Volume: 2
Issue: 1
Year: 2013





Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

Author(s): Sodeif Ahadpour | Mahdiyeh Majidpour
Volume: 2
Issue: 1
Year: 2013





Upper Bound of Code-word Number of Some Separating Codes

Author(s): Ryul Kim | Myong-son Sihn | Ok-hyon Song
Volume: 2
Issue: 1
Year: 2013





Deterministic and Probabilistic Approach in Primality Checking for RSA Algorithm

Author(s): Kumarjit Banerjee | Satyendra Nath Mandal | Sanjoy Das
Volume: 2
Issue: 1
Year: 2013





Codes Detecting and Locating Periodic Errors

Author(s): P. K. Das | Vinod Tyagi
Volume: 2
Issue: 1
Year: 2013





Review on fifteen Statistical Tests proposed by NIST

Author(s): J K M Sadique Uz Zaman | Ranjan Ghosh
Volume: 1
Issue: 1
Year: 2012





Localization of Hard Exudates in Retinal Fundus Image by Mathematical Morphology Operations

Author(s): Mehdi Ghafourian Fakhar Eadgahi | Hamidreza Pourreza
Volume: 1
Issue: 1
Year: 2012





Quasi-Linear Time Fully Homomorphic Public Key Encryption Algorithm (ZK111)

Author(s): Zaryab Khan
Volume: 1
Issue: 1
Year: 2012





A Pseudorandom Bit Generator based on Chaotic Coupled Map Lattices

Author(s): Sodeif Ahadpour | Yaser Sadra
Volume: 1
Issue: 1
Year: 2012




