×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of international-journal-of-information-and-network-security-ijins
Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC
72 views
Pattern Based Network Security Using Semi-Supervised Learning
38 views
Performance Evaluation of UWB Wireless Link
17 views
Client Side CSRF Defensive Tool
59 views
A New Signature Scheme Based on Factoring and Discrete Logarithm Problems
38 views
A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications
69 views
Peak-Throughput of LTE-Release 10 for Up/Down Link Physical Layer
73 views
Improved G-3PAKE Protocol with Formal Verification
11 views
An Efficient ID-Based Proxy Signcryption Scheme
45 views
A Trust Based Approach For Secure Access Control In Information Centric Network
38 views
SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message
22 views
AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization
149 views
GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver
197 views
Mobile Geographic Information System Platform (MGISP): A GPS Information Collection System
37 views
Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords
172 views
Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM)
37 views
Performance Analysis of Load Minimization In AODV and FSR
222 views
Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs
222 views
A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael
219 views
Review on Attack and Defense in Tor
214 views
Next >