×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of ijnsa
A Framework for Security Components Anomalies Severity Evaluation and Classification
211 views
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOMETRIC RECOGNITION SYSTEM
334 views
Self protection mechanism for wireless sensor networks
231 views
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
782 views
A novel (k,n) secret sharing scheme from
98 views
Analysis of rsa algorithm using gpu
123 views
Analysis and comparison of symmetric key
104 views
Privacy protection for role based access control in service oriented architecture
145 views
Role of integrated virtual e learning system for distance learning students
123 views
The impact of management information systems(mis) technologies on the quality of services provided at the university of tabuk
146 views
Attack graph based risk assessment and optimisation approach
140 views
A novel paradigm in authentication system
199 views
Design and implementation of hierarchical visual
300 views
A survey of trends in massive ddos attacks and cloud based mitigations
87 views
Survey of manet misbehaviour detection approaches
207 views
An iac approach for detecting profile cloning
229 views
A fair exchange & customer anonymity protocol
169 views
Investigating the effects of the common control channel challenge in multichannel cognitive networks with hypothetical spectrum hole
217 views
Performance analysis of transport layer basedhybrid covert channel detection engine
269 views
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
670 views
Next >