COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

December 2015, Volume 5, Number 3/4

Security Analysis of the Multi-Photon Three-Stage Quantum Key Distribution[Pdf]
Kam Wai Clifford Chan1, Mayssaa El Rifai1, Pramode Verma1, Subhash Kak2 and Yuhua Chen3, 1University of Oklahoma, USA, 2Oklahoma State University, USA and 3University of Houston, USA
An Efficient and Secure Digital Multi-Signature Protocol Based on Ecc[Pdf]
D. Sudha Devi, K. Thilagavathy and Preethi Sai Krishnan, Coimbatore Institute of Technology, Inida
RSA Algorithm With a New Approach Encryption and Decryption Message Text by ASCII[Pdf]
Ahmad Steef1, A. Alkhatib1 and M. N. Shamma1, 1Al Baath University, Syria and 2Damascus University, Syria
Development of Secure Cloud Transmission Protocol (SCTP) Engineering Phases : Multilevel Security & Cryptography[Pdf]
Dinesha H A and Vinod K Agrawal, PES Institute of Technology, India

June 2015, Volume 5, Number 2

Efficient Generalized Signcryption Based on Ecc[Pdf] 
An Braeken1 and Pawani Porambage2, 1Vrije Universiteit Brussel, Belgium and 2University of Oulu, Finland>

March 2015, Volume 5, Number 1

Penetration Testing in Agile Software Development Projects [Pdf] 
Martin Tomanek and Tomas Klima, University of Economics, Czech Republic
To the Networks Rfwkidea32-16, 32-8, 32-4, 32-2 and RFWKIDEA32-1, Based on the Network Idea32-16[Pdf] 
TuychievGulomNumonovich, National university of Uzbekistan, Republic of Uzbekistan, Tashkent

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN