首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Computer Network and Information Security
ISSN Print: 2074-9090
ISSN Online:
主页:
http://www.mecs-press.org/ijcnis/
分享:
Go
Omni Directional Antenna Assisted Scheme to Minimize Redundancy in Wireless Sensor Networks
Tarun Dubey
,
O.P. Sahu
A Framework for Real-Time Resource Allocation in IP Multimedia Subsystem Network
Muhammad Naeem
,
Sheneela Naz
,
Saira Gillani
Effect of Black Hole Attack on MANET Routing Protocols
Jaspal Kumar
,
M. Kulkarni
,
Daya Gupta
A Bespoke Technique for Secret Messaging
Mahimn Pandya
,
Hiren Joshi
,
Ashish Jani
Digital Image Scrambling Based on Two Dimensional Cellular Automata
Fasel Qadir
,
M. A. Peer
,
K. A. Khan
Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP
Sounak Paul
,
Bimal Kumar Mishra
Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management
Abd El–Naser A. Mohammed
,
Ahmed Nabih Zaki Rashed
,
Osama S. Fragallah
,
Mohamed G. El-Abyad
QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks
Sanjay Kumar
,
Mayank Dave
,
Surender Dahiya
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals
Zhukov Igor
,
Mikhaylov Dmitry
,
Starikovskiy Andrey
,
Kuznetsov Dmitry
Optimizing the CMTS to Improve Quality of Service in Next Generation Networks based on ACO Algorithm
Dac-Nhuong Le
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
Alawi A. Al-Saggaf
,
Haridas Acharya
Implementation of An Optimized and Pipelined Combinational Logic Rijndael S-Box on FPGA
Bahram Rashidi
,
Bahman Rashidi
Study the One-bit Hard Combination Scheme on Cognitive Radio Users
Md. Shamim Hossain
,
Mohammad Mamunur Rashid
,
Md. Nazrul Islam
,
Md. Abdullah-Al-Mashud
Biometric Passport Validation Scheme using Radio Frequency Identification
V.K. Narendira Kumar
,
B. Srinivasan
Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks
Ibrahim S. I. Abuhaiba
,
Huda B. Hubboub
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN
Harjot Bawa
,
Parminder Singh
,
Rakesh Kumar
A Comparative Study of Power Consumption Models for CPA Attack
Hassen Mestiri
,
Noura Benhadjyoussef
,
Mohsen Machhout
,
Rached Tourki
3-Level Heterogeneity Model for Wireless Sensor Networks
Satish Chand
,
Samayveer Singh
,
Bijendra Kumar
Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks
Dilpreet Kaur
,
Naresh Kumar
FPGA Based A New Low Power and Self-Timed AES 128-bit Encryption Algorithm for Encryption Audio Signal
Bahram Rashidi
,
Bahman Rashidi
Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks
S.Sheeja
,
Ramachandra.V.Pujeri
Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks
P.Periyasamy
,
E.Karthikeyan
A Novel Routing Scheme for Mobile Ad Hoc Network
Prem Chand
,
M.K.Soni
A Full-text Website Search Engine Powered by Lucene and The Depth First Search Algorithm
Modinat. A. Mabayoje
,
O. S. Oni
,
Olawale S. Adebayo
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System
G.Velmayil
,
S.Pannirselvam
Recent Replica Placement Algorithms in P2P Networks – A Review
Kala Karun. A
,
Jayasudha. J. S
A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature
V.K. Narendira Kumar
,
B. Srinivasan
Criteria Specifications for the Comparison and Evaluation of Access Control Models
Shabnam Mohammad Hasani
,
Nasser Modiri
Blactr: A Technique to Revoke the Misbehaving Users with TTP
H.Jayasree
,
A. Damodaram
A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks
CH. V. Raghavendran
,
G. Naga Satish
,
P. Suresh Varma
Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
Poonam Jindal
,
Brahmjit Singh
Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach
G.RoslineNesakumari
,
V.Vijayakumar
,
B.V.Ramana Reddy
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
Balasaheb N. Jagdale
,
Nileema S. Gawande
Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries
Jaskanwal Minhas
,
Raman Kumar
Formal Verification of Congestion Control Algorithm in VANETs
Mohamad Yusof Darus
,
Kamalrulnizam Abu Bakar
Vulnerabilities in Academic E-governance Portals
Subhash Chander
,
Ashwani Kush
Exponential Brute-Force Complexity of A Permutation Based Stream Cipher
Mohammed Omari
,
Hamdy S. Soliman
The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity
Shafi’í Muhammad Abdulhamid
,
Olawale Surajudeen Adebayo
,
Damian Oshomah Ugiomoh
,
Mohammed Danlami AbdulMalik
Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems
Vadym Mukhin
,
Artem Volokyta
User’s Profile Replication Tree and On Demand Replica Update in Wireless Communication
Prem Nath
,
Chiranjeev Kumar
Preventive Aspect of Black Hole Attack in Mobile AD HOC Network
Kumar Roshan
,
Vimal Bibhu
Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks
Ibrahim S. I. Abuhaiba
,
Huda B. Hubboub
An Overview of Vertical Handoff Decision Making Algorithms
A. Bhuvaneswari
,
E. George Dharma Prakash Raj
Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients
Akash Rajak
,
Kanak Saxena
Importance of S-Blocks in Modern Block Ciphers
Lisitskaya I.V.
,
Melnychuk E.D
,
Lisitskiy K.E.
Evaluation of IP Multimedia Subsystem based Mobile Mass Examination System
Ahmed Barnawi
,
Abdulrahman H. Altalhi
,
M. Rizwan Jameel Qureshi
,
Asif Irshad Khan
Methodology for Benchmarking IPsec Gateways
Adam Tisovsky
,
Ivan Baroňák
Estimating the Video Registration Using Image Motions
N.Kannaiya Raja
,
K.Arulanandam
,
R.Radha krishnan
,
M.Nataraj
Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WIMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication
B.Sridevi
,
S.Rajaram
Fast Vertical Handover Algorithm for Vehicular Communication: A Holistic Approach
Sourav Dhar
,
Shubhajit Datta
,
Rabindra Nath Bera
,
Amitava Ray
Go