International Journal of Electronics and Information Engineering | ||
1. | Network Neutrality: Developing Business Model and Evidence Based Net Neutrality Regulation
|
|
Anurag Rana, Vol. 3, No. 1, 2015, pp. 1-9 Article Full Text PDF .bib |
||
2. | Straddling The Next Cyber Frontier: The Empirical Analysis On Network Security, Exploits, and Vulnerabilities
|
|
Emmanuel Uzoma Opara, Oredola A. Soluade, Vol. 3, No. 1, 2015, pp. 10-18 Article Full Text PDF .bib |
||
3. | Subliminal-free Variant of Schnorr Signature with Provable Security
|
|
Yinghui Zhang, Hui Li, Xiaoqing Li, and Hui Zhu, Vol. 3, No. 1, 2015, pp. 19-30 Article Full Text PDF .bib |
||
4. | A Novel Trust Based System to Detect the Intrusive Behavior in MANET
|
|
Ganesh Gopal Deverajan, R. Saravanan , Vol. 3, No. 1, 2015, pp. 31-43 Article Full Text PDF .bib |
||
5. | Taxonomy on Security Attacks on Self Configurable Networks
|
|
Noor Mohd, Singh Annapurna, H. S. Bhadauria, Vol. 3, No. 1, 2015, pp. 44-52 Article Full Text PDF .bib |
||
6. | Reviewer index to volume 3 (2015)
|
|