International Journal of Electronics and Information Engineering | ||
1. | The Encryption Algorithms GOST28147-89-IDEA8-4 and GOST28147-89-RFWKIDEA8-4
|
|
Gulom Tuychiev, Vol. 6, No. 2, 2017, pp. 59-71 Article Full Text PDF .bib |
||
2. | An Anti-Phishing kit Scheme for Secure Web Transactions
|
|
Abdul Abiodun Orunsolu, A. S. Sodiya, A. T. Akinwale, B. I. Olajuwon, Vol. 6, No. 2, 2017, pp. 72-86 Article Full Text PDF .bib |
||
3. | A Hybrid Digital Signature Scheme on Dependable and Secure Data
|
|
Addepalli V. N. Krishna, Addepalli Hari Narayana, Somanchi Krishna Murthy, Vol. 6, No. 2, 2017, pp. 87-93 Article Full Text PDF .bib |
||
4. | Evaluating the Segmentation Methods of Image Logs to Identify Natural Fractures in Hydrocarbon Wells
|
|
Milad Karami, Ahmad Keshavarz, Hamed Jelodar, Vol. 6, No. 2, 2017, pp. 94-109 Article Full Text PDF .bib |
||
5. | Analysis of One Certificateless Encryption for Secure Data Sharing in Public Clouds
|
|
Lihua Liu, Wenping Kong, Zhengjun Cao, Jinbo Wang, Vol. 6, No. 2, 2017, pp. 110-115 Article Full Text PDF .bib |
||
6. | Mobile Malware and Defending Systems: Comparison Study
|
|
Abdullah A. Al-khatib, Waleed A. Hammood, Vol. 6, No. 2, 2017, pp. 116-123 Article Full Text PDF .bib |
||
7. | Reviewer index to volume 6 (2017)
|
|