| International Journal of Electronics and Information Engineering | ||
| 1. | The Encryption Algorithms GOST28147-89-IDEA8-4 and GOST28147-89-RFWKIDEA8-4
|
|
| Gulom Tuychiev, Vol. 6, No. 2, 2017, pp. 59-71 Article Full Text PDF .bib |
||
| 2. | An Anti-Phishing kit Scheme for Secure Web Transactions
|
|
| Abdul Abiodun Orunsolu, A. S. Sodiya, A. T. Akinwale, B. I. Olajuwon, Vol. 6, No. 2, 2017, pp. 72-86 Article Full Text PDF .bib |
||
| 3. | A Hybrid Digital Signature Scheme on Dependable and Secure Data
|
|
| Addepalli V. N. Krishna, Addepalli Hari Narayana, Somanchi Krishna Murthy, Vol. 6, No. 2, 2017, pp. 87-93 Article Full Text PDF .bib |
||
| 4. | Evaluating the Segmentation Methods of Image Logs to Identify Natural Fractures in Hydrocarbon Wells
|
|
| Milad Karami, Ahmad Keshavarz, Hamed Jelodar, Vol. 6, No. 2, 2017, pp. 94-109 Article Full Text PDF .bib |
||
| 5. | Analysis of One Certificateless Encryption for Secure Data Sharing in Public Clouds
|
|
| Lihua Liu, Wenping Kong, Zhengjun Cao, Jinbo Wang, Vol. 6, No. 2, 2017, pp. 110-115 Article Full Text PDF .bib |
||
| 6. | Mobile Malware and Defending Systems: Comparison Study
|
|
| Abdullah A. Al-khatib, Waleed A. Hammood, Vol. 6, No. 2, 2017, pp. 116-123 Article Full Text PDF .bib |
||
| 7. | Reviewer index to volume 6 (2017)
|
|