International Journal of Electronics and Information Engineering | ||
1. | Cloud Computing Login Authentication Redesign
|
|
Eric Opoku Osei, James Benjamin Hayfron-Acquah, Vol. 1, No. 1, 2014, pp. 1-8 Article Full Text PDF .bib |
||
2. | 1-2 Skip List Approach for Efficient Security Checks in Wireless Mesh Networks
|
|
Hemraj Saini, Vol. 1, No. 1, 2014, pp. 9-15 Article Full Text PDF .bib |
||
3. | Memory-only Selection of Dictionary PINs
|
|
Martin Stanek, Vol. 1, No. 1, 2014, pp. 16-22 Article Full Text PDF .bib |
||
4. | Shielding the Grid World: An Overview
|
|
Christos Chrysoulas, Vol. 1, No. 1, 2014, pp. 23-28 Article Full Text PDF .bib |
||
5. | Efficient X-box Mapping in Stego-image Using Four-bit Concatenation
|
|
Manoharan Shobana, Vol. 1, No. 1, 2014, pp. 29-33 Article Full Text PDF .bib |
||
6. | Increase the Performance of Mobile Smartphones Using Partition and Migration of Mobile Applications to Cloud Computing
|
|
Diaa Salama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayedr, Vol. 1, No. 1, 2014, pp. 34-44 Article Full Text PDF .bib |
||
7. | A Comparative Study of Lossless Compression Algorithm on Text Data
|
|
Amit Jain, Vol. 1, No. 1, 2014, pp. 45-52 Article Full Text PDF .bib |
||
8. | Reviewer index to volume 1 (2014)
|
|