×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of aircc-ijnsa
Error Detection and Correction for Distributed Group Key Agreement Protocol
224 views
Information Security Synthesis in Online Universities
220 views
Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options
222 views
A Security Framework for SOA Applications in Mobile Environment
222 views
Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures
219 views
EXPLOITING RHETORICAL RELATIONS TO MULTIPLE DOCUMENTS TEXT SUMMARIZATION
227 views
Substitution-diffusion based Image Cipher
224 views
Workload Characterization of Spam Email Filtering Systems
219 views
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application
219 views
Effective Voice Calls Admission for Authorized User in Inter VOIP Network
222 views
Emergency Response Communications and Associated Security Challenges
219 views
ijnsa050309
218 views
Identification of Image Spam by Using Low Level & Metadata Features
221 views
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study
217 views
Forensic Analysis of Windows Registry Against Intrusion
226 views
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
226 views
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
218 views
Psim: A Tool for Analysis of Device Pairing Methods
219 views
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
217 views
Micro Rotor Enhanced Block Cipher
224 views
< Prev
Next >