Quick Search:

Volume: 6, No: 2 (June 1, 2017)

International Journal of Electronics and Information Engineering

1. The Encryption Algorithms GOST28147-89-IDEA8-4 and GOST28147-89-RFWKIDEA8-4
Gulom Tuychiev, Vol. 6, No. 2, 2017, pp. 59-71
Article Full Text PDF
  .bib

2. An Anti-Phishing kit Scheme for Secure Web Transactions
Abdul Abiodun Orunsolu, A. S. Sodiya, A. T. Akinwale, B. I. Olajuwon, Vol. 6, No. 2, 2017, pp. 72-86
Article Full Text PDF
  .bib

3. A Hybrid Digital Signature Scheme on Dependable and Secure Data
Addepalli V. N. Krishna, Addepalli Hari Narayana, Somanchi Krishna Murthy, Vol. 6, No. 2, 2017, pp. 87-93
Article Full Text PDF
  .bib

4. Evaluating the Segmentation Methods of Image Logs to Identify Natural Fractures in Hydrocarbon Wells
Milad Karami, Ahmad Keshavarz, Hamed Jelodar, Vol. 6, No. 2, 2017, pp. 94-109
Article Full Text PDF
  .bib

5. Analysis of One Certificateless Encryption for Secure Data Sharing in Public Clouds
Lihua Liu, Wenping Kong, Zhengjun Cao, Jinbo Wang, Vol. 6, No. 2, 2017, pp. 110-115
Article Full Text PDF
  .bib

6. Mobile Malware and Defending Systems: Comparison Study
Abdullah A. Al-khatib, Waleed A. Hammood, Vol. 6, No. 2, 2017, pp. 116-123
Article Full Text PDF
  .bib

7. Reviewer index to volume 6 (2017)