Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC
Pattern Based Network Security Using Semi-Supervised Learning
Performance Evaluation of UWB Wireless Link
Client Side CSRF Defensive Tool
A New Signature Scheme Based on Factoring and Discrete Logarithm Problems
A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications
Peak-Throughput of LTE-Release 10 for Up/Down Link Physical Layer
Improved G-3PAKE Protocol with Formal Verification
An Efficient ID-Based Proxy Signcryption Scheme
A Trust Based Approach For Secure Access Control In Information Centric Network
SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message
AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization
GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver
Mobile Geographic Information System Platform (MGISP): A GPS Information Collection System
Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords
Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM)
Performance Analysis of Load Minimization In AODV and FSR
Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs
A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael
Review on Attack and Defense in Tor