Quick Search:

Volume: 2, No: 1 (March 1, 2015)

International Journal of Electronics and Information Engineering

Volume: 2, No. 1 (Cover-v2-n1.jpg)
1. On the Security Analysis of Protocols Using Action Language
Suvansh Lal, Manik Lal Das, Vol. 2, No. 1, 2015, pp. 1-9
Article Full Text PDF

2. An Attribute Based Key Agreement Protocol Resilient to KCI Attack
Majid Bayat, MohammadReza Aref, Vol. 2, No. 1, 2015, pp. 10-20
Article Full Text PDF

3. MMOPRG Bot Detection Based on Traffic Analysis
Ye Zhu, Yuanchao Lu, Matthew Itomlenskis, Seetharamayya Vyaghri, Huirong Fu, Vol. 2, No. 1, 2015, pp. 21-31
Article Full Text PDF

4. Learning to Dialogue in Identifying User's Interest by Partial Observable Markov Decision Process
Oscar Li Jen Hsu, Von-Wun Soo, Vol. 2, No. 1, 2015, pp. 32-46
Article Full Text PDF

5. A Multi-secret Sharing Scheme Based on the CRT and RSA
Xuedong Dong, Vol. 2, No. 1, 2015, pp. 47-51
Article Full Text PDF

6. Subject index to volume 2 (2015)
Article Full Text PDF

7. Author index to volume 2 (2015)
Article Full Text PDF

8. Reviewer index to volume 2 (2015)
Article Full Text PDF