|
Issue |
Title |
|
Volume 5, Issue 1, January 2016 |
Summarization of Various Security Aspects and Attacks in Distributed Systems: A Review |
Abstract
PDF
|
Istam Uktamovich Shadmanov, Kamola Shadmanova |
|
Volume 5, Issue 2, March 2016 |
Enhancing Data Security in the Cloud Using the Proposed Algorithm |
Abstract
PDF
|
Naser Attar |
|
Volume 3, Issue 3, May 2014 |
Current Status of e-Government Services in Tanzania: A Security Perspective |
Abstract
PDF
|
Mohamed Dewa, Irina Zlotnikova |
|
Volume 4, Issue 6, November 2015 |
Developing an Allocation Framework for Information Security Systems |
Abstract
PDF
|
Shimaa Mohamed, Abdel Nasser Zaied, Walid Khedr |
|
Volume 3, Issue 6, November 2014 |
Towards a Secure Maturity Model for Protecting e-Government Services in Tanzania: A Stakeholders View |
Abstract
PDF
|
Mohamed D. Waziri, Zaipuna O. Yonah |
|
Volume 5, Issue 1, January 2016 |
Digital Image Encryption Based On Multiple Chaotic Maps |
Abstract
PDF
|
Amir Houshang Arab Avval, Jila ayubi, Farangiz Arab |
|
Volume 3, Issue 5, September 2014 |
A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania |
Abstract
PDF
|
Mohamed D. Waziri, Zaipuna O. Yonah |
|
Volume 3, Issue 2, March 2014 |
Botnet Detection using NetFlow and Clustering |
Abstract
PDF
|
Pedram Amini, Reza Azmi, MuhammadAmin Araghizadeh |
|
Volume 3, Issue 5, September 2014 |
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags |
Abstract
PDF
|
Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki |
|
Volume 3, Issue 2, March 2014 |
Traditional Host based Intrusion Detection Systems’ Challenges in Cloud Computing |
Abstract
PDF
|
Masoudeh Keshavarzi |
|
Volume 3, Issue 6, November 2014 |
Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol |
Abstract
PDF
|
Seyed Mohammad Alavi, Behzad Abdolmaleki, Karim Baghery |
|
Volume 3, Issue 2, March 2014 |
A New Robust Audio Signal Steganography Based On Multiple Chaotic Algorithms With Edge Detection Technique |
Abstract
PDF
|
Amir Houshang Arab Avval, Shahram Mohanna |
|
Volume 3, Issue 2, March 2014 |
Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard |
Abstract
PDF
|
Masoud Mohammadi, Mehdi Hosseinzadeh, Mohammad Esmaeildoust |
|
Volume 4, Issue 3, May 2015 |
Security, Privacy Awareness vs. Utilization of Social Networks and Mobile Apps for Learning: Students` Preparedness |
Abstract
PDF
|
Daniel Koloseni |
|
Volume 4, Issue 3, May 2015 |
A Strengthened Version of a Hash-based RFID Server-less Security Scheme |
Abstract
PDF
|
Shahab Abdolmaleky, Shahla Atapoor, Mohammad Hajighasemlou, Hamid Sharini |
|
Volume 3, Issue 4, July 2014 |
A Secure Model for Remote Electronic Voting: A Case of Tanzania |
Abstract
PDF
|
Sylvester Kimbi, Irina Zlotnikova |
|
Volume 4, Issue 3, May 2015 |
Mitigating Intrusion and Vulnerabilities in Cognitive Radio Networks |
Abstract
PDF
|
I. Ohaeri, O. Ekabua, B. Isong, M. Esiefarienrhe, M. Motojane |
|
Volume 3, Issue 4, July 2014 |
Chaotic Image Encryption Based On Discrete Wavelet |
Abstract
PDF
|
Amirhoushang Arab Avval, Jila Ayubi |
|
Volume 4, Issue 4, July 2015 |
A Survey on Security Issues in Big Data and NoSQL |
Abstract
PDF
|
Ebrahim Sahafizadeh, Mohammad Ali Nematbakhsh |
|
Volume 2, Issue 3, July 2013 |
Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks |
Abstract
PDF
|
Mohammad Reza Rohbanian, Mohammad Rafi Kharazmi, Alireza Keshavarz-Haddad, Manije Keshtgary |
|
Volume 3, Issue 4, July 2014 |
Anomaly Detection Mechanism based on Common NSM Data Objects for Advanced Metering Infrastructure |
Abstract
PDF
|
Seongho Ju, Yonghun Lim, Chunghyo Kim, Kyungseok Jeon |
|
Volume 4, Issue 4, July 2015 |
A comparative study and classification on web service security testing approaches |
Abstract
PDF
|
Azadeh Esfandyari |
|
Volume 2, Issue 3, July 2013 |
A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines |
Abstract
PDF
|
Amir Golchini, Abolfazl Toroghi Haghighat, Hasan Rashidi |
|
Volume 3, Issue 5, September 2014 |
Towards A Secure Remote Electronic Voting in Tanzania Organizational Challenges |
Abstract
PDF
|
Sylvester Kimbi, Yaw Nkansah-Gyekye, Kisangiri Michael |
|
Volume 4, Issue 5, September 2015 |
New attacks on Wi-Fi Protected Setup |
Abstract
PDF
|
Hamed Mohtadi, Alireza Rahimi |
|
1 - 25 of 28 Items |
1 2 > >> |