Table of Contents
Vol 2, No 4 (2015)
Research Articles
Dynamic Node Recovery in MANET for High Recovery Probability | ||
Ravneet Kaur, Neeraj Sharma | ||
Vol 2, No 4 (2015), Pagination: 158-164 | ||
ABSTRACT | PDF | Abstract Views: 304 | PDF Views: 0 |
Prioritized and Secured Data Dissemination Technique in VANET Based on Optimal Blowfish Algorithm and Signcryption Method | ||
M. Selvi, B. Ramakrishnan | ||
Vol 2, No 4 (2015), Pagination: 165-172 | ||
ABSTRACT | PDF | Abstract Views: 285 | PDF Views: 0 |
Adaptive Routing Protocol based on Cuckoo Search algorithm (ARP-CS) for secured Vehicular Ad hoc network (VANET) | ||
B. Ramakrishnan, S. R. Sreedivya, M. Selvi | ||
Vol 2, No 4 (2015), Pagination: 173-178 | ||
ABSTRACT | PDF | Abstract Views: 316 | PDF Views: 0 |
The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case | ||
Ntjatji Gosebo, Sipho Seepe | ||
Vol 2, No 4 (2015), Pagination: 188-195 | ||
ABSTRACT | PDF | Abstract Views: 267 | PDF Views: 1 |
Machine-to-Machine Communications for Smart Homes | ||
Resul Das, Gurkan Tuna | ||
Vol 2, No 4 (2015), Pagination: 196-202 | ||
ABSTRACT | PDF | Abstract Views: 294 | PDF Views: 0 |
Review Article
Security and Fraud Issues of E-Banking | ||
Emad Abu-Shanab, Salam Matalqa | ||
Vol 2, No 4 (2015), Pagination: 179-187 | ||
ABSTRACT | PDF | Abstract Views: 295 | PDF Views: 0 |