| International Journal of Electronics and Information Engineering | ||
![]() |
||
| 1. | Network Neutrality: Developing Business Model and Evidence Based Net Neutrality Regulation
|
|
| Anurag Rana, Vol. 3, No. 1, 2015, pp. 1-9 Article Full Text PDF .bib |
||
| 2. | Straddling The Next Cyber Frontier: The Empirical Analysis On Network Security, Exploits, and Vulnerabilities
|
|
| Emmanuel Uzoma Opara, Oredola A. Soluade, Vol. 3, No. 1, 2015, pp. 10-18 Article Full Text PDF .bib |
||
| 3. | Subliminal-free Variant of Schnorr Signature with Provable Security
|
|
| Yinghui Zhang, Hui Li, Xiaoqing Li, and Hui Zhu, Vol. 3, No. 1, 2015, pp. 19-30 Article Full Text PDF .bib |
||
| 4. | A Novel Trust Based System to Detect the Intrusive Behavior in MANET
|
|
| Ganesh Gopal Deverajan, R. Saravanan , Vol. 3, No. 1, 2015, pp. 31-43 Article Full Text PDF .bib |
||
| 5. | Taxonomy on Security Attacks on Self Configurable Networks
|
|
| Noor Mohd, Singh Annapurna, H. S. Bhadauria, Vol. 3, No. 1, 2015, pp. 44-52 Article Full Text PDF .bib |
||
| 6. | Reviewer index to volume 3 (2015)
|
|