- DocumentoPattern Based Network Security Using Semi-Supervised Learningcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoBroadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM)caricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoElliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECCcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoA Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applicationscaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoAn Efficient ID-Based Proxy Signcryption Schemecaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoPerformance Evaluation of UWB Wireless Linkcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoCompact and Integrated Routing Photonic Crystals Structures Design Using the Two-dimensional FDTD Methodcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoClient Side CSRF Defensive Toolcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoNovel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwordscaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoA New Signature Scheme Based on Factoring and Discrete Logarithm Problemscaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoPerformance Analysis of Load Minimization In AODV and FSRcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoMobile Geographic Information System Platform (MGISP)caricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoGPS signal accuracy and coverage analysis platformcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoA Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndaelcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoAES Encryption Algorithm Hardware Implementation Architecturecaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoReview on Attack and Defense in Torcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoA Trust Based Approach For Secure Access Control In Information Centric Networkcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoPeak-Throughput of LTE-Release 10 for Up/Down Link Physical Layercaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoSecrecy and Performance Analysis of Symmetric Key Encryption Algorithmscaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoSD-AREEcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoA New Proxy Blind Signature Scheme Based on DLPcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoFast Mapping Method based on Matrix Approach For Elliptic Curve Cryptographycaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoA Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Modelcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoDeveloping a Secure Programming Module to cope with Modern Vulnerabilitiescaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoA Password attack on S-3 PAKE Protocolcaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoSynthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costscaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoThe Transmission Multicast and The Control of QoS For IPv 6 Using The Infrastructure MPLScaricato daInternational Journal of Information and Network Security (IJINS)
- DocumentoImproved G-3PAKE Protocol with Formal Verificationcaricato daInternational Journal of Information and Network Security (IJINS)