×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of ijnsa
A fair exchange & customer anonymity protocol
169 views
Multi carrier equalization by restoration of redundanc y (merry) for adaptive channel shortening in multi-carrier systems
195 views
Investigating the effects of the common control channel challenge in multichannel cognitive networks with hypothetical spectrum hole
217 views
Performance analysis of transport layer basedhybrid covert channel detection engine
269 views
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
674 views
A NOVEL APPROACH FOR SECURE ROUTING THROUGH BGP USING SYMMETRIC KEY
969 views
Securing mobile cloud using finger print authentication
381 views
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USING PSO
527 views
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
453 views
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
1.533 views
Ijnsa050214
263 views
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
427 views
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PHYSICAL LEVEL
308 views
KNOWLEDGE-BASED AUTHENTICATION USING TWITTER CAN WE USE LUNCH MENUS AS PASSWORDS?
223 views
ONTOLOGY-DRIVEN INFORMATION RETRIEVAL FOR HEALTHCARE INFORMATION SYSTEM : A CASE STUDY
643 views
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (MREBC)
308 views
PERFORMANCE EVALUATION OF ENHANCEDGREEDY- TWO-PHASE DEPLOYMENT ALGORITHM
230 views
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
468 views
Ijnsa050211
284 views
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CROWD IN A CLOUD COMPUTING ENVIRONMENT
519 views
< Prev
Next >