Issue | Title | |
Volume 4, Issue 3, May 2015 | A Strengthened Version of a Hash-based RFID Server-less Security Scheme | Abstract PDF |
Shahab Abdolmaleky, Shahla Atapoor, Mohammad Hajighasemlou, Hamid Sharini | ||
Volume 3, Issue 4, July 2014 | A Secure Model for Remote Electronic Voting: A Case of Tanzania | Abstract PDF |
Sylvester Kimbi, Irina Zlotnikova | ||
Volume 4, Issue 3, May 2015 | Mitigating Intrusion and Vulnerabilities in Cognitive Radio Networks | Abstract PDF |
I. Ohaeri, O. Ekabua, B. Isong, M. Esiefarienrhe, M. Motojane | ||
26 - 28 of 28 Items | << < 1 2 |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"