|
Issue |
Title |
|
Vol 13, No 1 (2021) |
A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing Environments |
Abstract
PDF
|
Khalil H. A. Al-Shqeerat, Khalil Ibrahim Abuzanouneh |
|
Vol 13, No 1 (2021) |
A Low Power Architectural Framework for Automated Surveillance System with Low Bit Rate Transmission |
Abstract
PDF
|
Hanan A. Hosni Mahmoud |
|
Vol 12, No 3 (2020) |
A Methodology for Assuring Privacy by Design in Information Systems |
Abstract
PDF
|
Siham Arfaoui, Abdellatif MEZRIOUI, Abdelhamid BELMEKKI |
|
Vol 10, No 2 (2018) |
A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks(UASN) |
Abstract
PDF
|
Sri Lekha |
|
Vol 9, No 3 (2017) |
A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET |
Abstract
PDF
|
jhum swain, binod kumar pattanayak, bibudhendu patimilu |
|
Vol 10, No 2 (2018) |
A New Approach in Expanding the Hash Size of MD5 |
Abstract
PDF
|
Esmael Verano Maliberan, Ariel M Sison, Ruji P Medina |
|
Vol 10, No 3 (2018) |
A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment |
Abstract
PDF
|
Omar ACHBAROU |
|
Vol 7, No 2 (2015) |
A new Itinerary planning approach among multiple mobile agents in wireless sensor networks (WSN) to reduce energy consumption |
Abstract
PDF
|
Imene Aloui, OKBA KAZAR, LAID KAHLOUL, SYLVIE SERVIGNE |
|
Vol 9, No 1 (2017) |
A New Method of User Association in Wireless Mesh Networks |
Abstract
PDF
|
Vijaya Kumar Gurram, C Shoba Bindu |
|
Vol 10, No 2 (2018) |
A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems |
Abstract
PDF
|
Ali M Shatnawi, Bushra AlHajouj, Moath Jarrah |
|
Vol 12, No 1 (2020) |
A New Objective Function Based on Additive Combination of Node and Link Metrics as a Mechanism Path Selection for RPL Protocol |
Abstract
PDF
|
Abdelhadi Eloudrhiri Hassani, Aicha Sahel, Abdelmajid Badri |
|
Vol 3, No 1 (2011) |
A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks |
Abstract
PDF
|
Yaser khamayseh, Abdulraheem Bader, Wail Mardini, and Muneer Bani Yasein |
|
Vol 10, No 1 (2018) |
A New Scheme for Spreading & De-spreading in the Direct Sequence Spread Spectrum Mechanism |
Abstract
PDF
|
Magdy Ibrahim ElSharkawy |
|
Vol 11, No 2 (2019) |
A New Secure Lightweight Authentication Protocol for NFC mobile Payment |
Abstract
PDF
|
Reham Abdellatif Abouhogail |
|
Vol 11, No 1 (2019) |
A New Variant of Game Theory Based Decision Making (GTDM) Algorithm Routing Protocols to Improve Energy Efficiency on Vehicular Delay Tolerant Network (VDTN) |
Abstract
PDF
|
Muhammad Biben Triadi, Doan Perdana, Rendy Munadi, Li Wenzao |
|
Vol 8, No 2 (2016) |
A Novel Access Control Model Based on the Structure of Applications |
Abstract
PDF
|
Afshin Rezakhani, Hossein Shirazi, Naser Modiri |
|
Vol 10, No 1 (2018) |
A Novel and Low Processing Time ECG Security Method Suitable for Sensor Node Platforms |
Abstract
PDF
|
Jusak Jusak, Seedahmed Sharif Mahmoud |
|
Vol 12, No 2 (2020) |
A Novel Design of Audio CAPTCHA for Visually Impaired Users |
Abstract
PDF
|
Mrim Mhsn Alnfiai |
|
Vol 4, No 2 (2012) |
A Novel Radio Mode Identification Approach for Spectrum Sensing in Cognitive Radios |
Abstract
PDF
|
Farrukh Javed, Imran Shafi, Asad Mahmood |
|
Vol 11, No 1 (2019) |
A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring |
Abstract
PDF
|
A Basnet, Abeer Alsadoon, P.W.C Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi |
|
Vol 11, No 1 (2019) |
A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION |
Abstract
PDF
|
AMJAD Yosef HENDI, Majed Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S Soliman |
|
Vol 9, No 3 (2017) |
A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network |
Abstract
PDF
|
Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I Wayan Mustika |
|
Vol 12, No 3 (2020) |
A novel Watermarking Technique Based on Hybrid Transforms |
Abstract
PDF
|
Hanaa A. Abdallah, Sara Alsodairi |
|
Vol 9, No 2 (2017) |
A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks |
Abstract
PDF
|
Badr Benmammar, Youcef Benmouna, Asma Amraoui, Francine Krief |
|
Vol 1, No 2 (2009) |
A Performance Comparison of Virtual Backbone Formation Algorithms for Wireless Mesh Networks |
Abstract
PDF
|
G. Ibáñez, E. Manzanedo, Juan A. Carral, A. García, J. M. Arco |
|
26 - 50 of 427 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |