Quick Search:

Volume: 2, No: 1 (March 1, 2015)

International Journal of Electronics and Information Engineering

Volume: 2, No. 1 (Cover-v2-n1.jpg)
1. On the Security Analysis of Protocols Using Action Language
Suvansh Lal, Manik Lal Das, Vol. 2, No. 1, 2015, pp. 1-9
Article Full Text PDF
  .bib

2. An Attribute Based Key Agreement Protocol Resilient to KCI Attack
Majid Bayat, MohammadReza Aref, Vol. 2, No. 1, 2015, pp. 10-20
Article Full Text PDF
  .bib

3. MMOPRG Bot Detection Based on Traffic Analysis
Ye Zhu, Yuanchao Lu, Matthew Itomlenskis, Seetharamayya Vyaghri, Huirong Fu, Vol. 2, No. 1, 2015, pp. 21-31
Article Full Text PDF
  .bib

4. Learning to Dialogue in Identifying User's Interest by Partial Observable Markov Decision Process
Oscar Li Jen Hsu, Von-Wun Soo, Vol. 2, No. 1, 2015, pp. 32-46
Article Full Text PDF
  .bib

5. A Multi-secret Sharing Scheme Based on the CRT and RSA
Xuedong Dong, Vol. 2, No. 1, 2015, pp. 47-51
Article Full Text PDF
  .bib

6. Reviewer index to volume 2 (2015)