Search


 
Issue Title
 
Vol 3, No 2 Next Generation Firewall in Modern Network Security Abstract  PDF
Prof Dr. K. N. Barbole, Prof. S.D. Satav
 
Vol 3, No 3 Formal specification, verification and correction of security policies based on the decision tree approach Abstract  PDF
Kamel Karoui, fakher ben ftima, Henda Ben Ghezala
 
Vol 4, No 1 Cyber Security Education: A Tool for National Security Abstract  PDF
Morufu Olalere, Dr. Victor O. Waziri, Idris Ismaila, Olawale S. Adebayo, Joel N. Ugwu
 
Vol 1, No 3 SECURITY THREATS OF SMART PHONES Abstract  PDF
Sivaramarajalu R V, Hari Krishna J, Sivakumar R
 
Vol 3, No 3 A Review: PAKE Security for Distributed Environment Abstract  PDF
Anitha Kumari K, Dr. SUDHA SADASIVAM G, MADHUMITHA R
 
Vol 2, No 2 Survey on Security Threats of Wireless & Mobile Adhoc Network Abstract  PDF
Sunaina Devi, Sanjeev Kumar Dhiman
 
Vol 2, No 3 An Adaptive Security Scheme for Secret Data using Cryptography and Steganography Abstract  PDF
Ankur Agarwal, Amit Asthana
 
Vol 4, No 1 A Proposal on Multi-Level Security in Cloud Computing by Hybrid Approach Using Image Sequencing Password and RSA Algorithm Abstract  PDF
Ashwin Dhivakar M R, Parveen Kumar
 
Vol 2, No 1 Shamir's Secret Sharing Algorithm Implemented in SQL Abstract  PDF
Constantin Florin Sîrbu
 
Vol 3, No 2 Security issues in MANET and Counter-Measures Abstract  PDF
Anthony Adoghe, Ajayi Olujimi, Dike Ike, Onasoga Olukayode
 
Vol 1, No 3 SECURITY IN COMPUTER NETWORKS Abstract  PDF
Andreea AS Ionescu, Raul - Serban
 
Vol 3, No 2 A New Security Architecture for Privacy-Preserving Aggregation and Access Control in Smart Grids Abstract  PDF
Halim Halimi, Aristotel Tentov
 
Vol 1, No 3 Survey of Performance Comparison of DES, 3DES and AES Algorithms Abstract  PDF
Chiranth bo, Shashikala B
 
Vol 4, No 1 Introduction to Network Security Abstract  PDF
Sahil Kumar, Jagdeep Singh, Nikhil Kumar, Shah Singh
 
Vol 1, No 2 Evaluation of Performance of Ciphers for Routing Protocols in Distributed Sensor Networks Abstract  PDF
Suresha Talanki, Nalini N.
 
Vol 4, No 1 Honeypots For Cloud Computing Abstract  PDF
Eduardo Henrique de Carvalho Moura, Zair Abdelouahab
 
Vol 3, No 3 Securing the IEEE 802.16 OFDM WiMAX PHYSICAL a MAC Layer Using STBC Coding and Encryption Abstract  PDF
Samuel Erskine, Ziengpieng WU
 
1 - 17 of 17 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"