×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
international-journal-of-information-and-network-security-ijins documents
Documents
Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC
Documents
Pattern Based Network Security Using Semi-Supervised Learning
Documents
Performance Evaluation of UWB Wireless Link
Documents
Client Side CSRF Defensive Tool
Documents
A New Signature Scheme Based on Factoring and Discrete Logarithm Problems
Documents
A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications
Documents
Peak-Throughput of LTE-Release 10 for Up/Down Link Physical Layer
Documents
Improved G-3PAKE Protocol with Formal Verification
Documents
An Efficient ID-Based Proxy Signcryption Scheme
Documents
A Trust Based Approach For Secure Access Control In Information Centric Network
Documents
SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message
Documents
AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization
Documents
GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver
Documents
Mobile Geographic Information System Platform (MGISP): A GPS Information Collection System
Documents
Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords
Documents
Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM)
Documents
Performance Analysis of Load Minimization In AODV and FSR
Documents
Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs
Documents
A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael
Documents
Review on Attack and Defense in Tor
Documents
A Password attack on S-3 PAKE Protocol
Next >