Quick Search:

Volume: 6, No: 1 (March 1, 2017)

International Journal of Electronics and Information Engineering

1. The Encryption Algorithms GOST28147-89-PES16-2 and GOST28147-89-RFWKPES16-2
Gulom Tuychiev, Vol. 6, No. 1, 2017, pp. 1-11
Article Full Text PDF
  .bib

2. A New Muzzle Classification Model Using Decision Tree Classifier
Ibrahim El-Henawy, Hazem. M. El Bakry, Hagar M. El Hadad, Vol. 6, No. 1, 2017, pp. 12-24
Article Full Text PDF
  .bib

3. An Empirical Evaluation of Security tips in Phishing Prevention: A Case Study of Nigerian Banks
Abdul Abiodun Orunsolu, A. S. Sodiya, A. T. Akinwale, B. I. Olajuwon, M. A. Alaran, O. O. Bamgboye, and O. A. Afolabi, Vol. 6, No. 1, 2017, pp. 25-39
Article Full Text PDF
  .bib

4. A Process of Security Assurance Properties Unification for Application Logic
Faisal Nabi, Muhammad Mustafa Nabi, Vol. 6, No. 1, 2017, pp. 40-48
Article Full Text PDF
  .bib

5. Active Monitoring & Postmortem Forensic Analysis of Network Threats: A Survey
Anshul Tayal, Nishchol Mishra and Sanjeev Sharma, Vol. 6, No. 1, 2017, pp. 49-59
Article Full Text PDF
  .bib

6. Reviewer index to volume 6 (2017)