International Journal of Computer Networks & Communications (IJCNC)

AIRCC PUBLISHING CORPORATION

AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION  Tran Cong Hung1, Nguyen Thanh Tri1,2 and Ho Nhut Minh3  1Post & Telecommunications Institute of Technology, Vietnam 2 Binh Duong … Continue reading

December 7, 2016 · Leave a comment

A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFORM AND CAZAC SEQUENCES

A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFORM AND CAZAC SEQUENCES Cherif Rezgui and Khaled Grayaa Communication Systems Lab, National School of Engineers of Tunis (ENIT), Tunisia … Continue reading

April 10, 2016 · Leave a comment

GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS

GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin School of Computer Sciences, Universiti Sains Malaysia, Malaysia ABSTRACT … Continue reading

April 8, 2016 · Leave a comment

8116ijnsa01

LIMITING SELF-PROPAGATING MALWARE BASED ON CONNECTION FAILURE BEHAVIOR THROUGH HYPER-COMPACT ESTIMATORS You Zhou1, Yian Zhou1, Shigang Chen1 and O. Patrick Kreidl2 1Department of Computer & Information Science & Engineering, University … Continue reading

February 8, 2016 · Leave a comment

july7415nsa02

PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS Heshem A. El Zouka Department of Computer Engineering, College of Engineering and Technology, Arab Academy for Science & Technology and Maritime Transport, Alexandria, Egypt

August 21, 2015 · Leave a comment

DESIGN AND IMPLEMENTATION OF NEW ROUTING STRATEGY FOR ENHANCED ENERGY EFFICIENT IN WSN Mehdi Bouallegue1,2, Hager Benfradj3, Kosai Raoof1 and Bouallegue Ridha3 1 Laboratory of Acoustics at University of Maine, … Continue reading

August 4, 2015 · Leave a comment

IJNSA Jan 07

A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFT ROWS TRANSFORMATION Auday H. Al-Wattar1, Ramlan Mahmod2 , Zuriati Ahmad Zukarnain3, and Nur Izura Udzir4, 1Faculty of Computer Science and Information … Continue reading

July 23, 2015 · Leave a comment

jan 06

 A NEW SECRET HANDSHAKES SCHEME WITHDYNAMIC MATCHING BASED ON ZSS Preeti Kulshrestha and Arun Kumar Pal Department of Mathematics, Statistics & Computer Science G.B. Pant University of Agriculture and Technology … Continue reading

July 22, 2015 · Leave a comment

IJNSA Jan 02

ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT Hasan Omar Al-Sakran Department of Management Information Systems, King Saud University, Riyadh, Saudi Arabia ABSTRACT   Number of businesses using cloud computing has … Continue reading

July 22, 2015 · Leave a comment

ijnsa jan 05

STRONG ZERO-KNOWLEDGE AUTHENTICATION BASED ON THE SESSION KEYS (SASK) Younes ASIMI1  Abdellah AMGHAR2  Ahmed ASIMI3 and Yassine SADQI4 134Laboratoire des Systèmes informatiques et Vision (LabSiV), Equipe de la Sécurité, Cryptologie, … Continue reading

July 22, 2015 · Leave a comment