A COMPARATIVE STUDY OF THE APPROACH PROVIDED FOR PREVENTING THE DATA LEAKAGE Kamaljeet Kaur1, Ishu Gupta2 and Ashutosh Kumar Singh2 1Govt. Sr. Sec. School, Ambala, Haryana, India 2Department of Computer … Continue reading
International journal of Computer Networks & Communications (IJCNC)
http://airccse.org/journal/ijcnc.html Accepted for indexing in Scopus, UGC, ERA Listed ISSN 0974 – 9322 (Online); 0975 – 2293 (Print) Scope & Topics The International journal of Computer Networks & Communications (IJCNC) … Continue reading
PROTOCOL SAFETY OF VOIP USING THE CRYPTOSYSTEMS BASED ON ELLIPTIC CURVE Layie Paul1 and Vivient Corneille Kamla2 1Department of Mathematics and Computer Science, Faculty of Science, University of Ngaoundere, Cameroon … Continue reading
A COMPARATIVE STUDY OF THE APPROACH PROVIDED FOR PREVENTING THE DATA LEAKAGE Kamaljeet Kaur1, Ishu Gupta2 and Ashutosh Kumar Singh2 1Govt. Sr. Sec. School, Ambala, Haryana, India 2Department of Computer … Continue reading
ijcnc 3
Evaluation Of Congestion Control Methods For Joint Multiple Resource Allocation In Cloud Computing Environments Shin-ichiKuribayashi Department of Computer and Information Science, Seikei University, Japan Abstract As cloud computing provides not … Continue reading
ijcnc 08
ECA Model Based Qos AODV Routing For Manets Raghavendra M.1 and Pallapa Venkataram 2 1Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur 572103, India. 2Department of Electrical … Continue reading
IJNSA-01
A Conceptual Secure Blockchain- based Electronic Voting System Ahmed Ben Ayed Department of Engineering and Computer Science, Colorado Technical University, Colorado Springs, Colorado, USA Abstract Blockchain is offering new opportunities … Continue reading
IJCNC 07
Data Aggregation Routing Protocols in Wireless Sensor Networks: A taxonomy Saeid Pourroostaei Ardakani Allameh Tabataba’i University, Tehran, Iran Abstract Routing in Wireless Sensor Network (WSN) aims to interconnect sensor nodes … Continue reading
IJNSA 01
Metric For Evaluating Availability Of An Information System: A Quantitative Approach Based On Component Dependency Suhail Qadir Mir1 and S.M.K. Quadri2 1Post Graduate Department of computer sciences, University of Kashmir, … Continue reading
IJCNC-06
Security analysis of AES and Enhancing its Security by Modifying S-Box with an Additional Byte Abdullah Al- Mamun1, Shawon S. M. Rahman, Ph.D.2, Tanvir Ahmed Shaon1, and MdAlam Hossain1 1Department … Continue reading