AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION Tran Cong Hung1, Nguyen Thanh Tri1,2 and Ho Nhut Minh3 1Post & Telecommunications Institute of Technology, Vietnam 2 Binh Duong … Continue reading
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFORM AND CAZAC SEQUENCES
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFORM AND CAZAC SEQUENCES Cherif Rezgui and Khaled Grayaa Communication Systems Lab, National School of Engineers of Tunis (ENIT), Tunisia … Continue reading
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin School of Computer Sciences, Universiti Sains Malaysia, Malaysia ABSTRACT … Continue reading
8116ijnsa01
LIMITING SELF-PROPAGATING MALWARE BASED ON CONNECTION FAILURE BEHAVIOR THROUGH HYPER-COMPACT ESTIMATORS You Zhou1, Yian Zhou1, Shigang Chen1 and O. Patrick Kreidl2 1Department of Computer & Information Science & Engineering, University … Continue reading
july7415nsa02
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS Heshem A. El Zouka Department of Computer Engineering, College of Engineering and Technology, Arab Academy for Science & Technology and Maritime Transport, Alexandria, Egypt
DESIGN AND IMPLEMENTATION OF NEW ROUTING STRATEGY FOR ENHANCED ENERGY EFFICIENT IN WSN Mehdi Bouallegue1,2, Hager Benfradj3, Kosai Raoof1 and Bouallegue Ridha3 1 Laboratory of Acoustics at University of Maine, … Continue reading
IJNSA Jan 07
A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFT ROWS TRANSFORMATION Auday H. Al-Wattar1, Ramlan Mahmod2 , Zuriati Ahmad Zukarnain3, and Nur Izura Udzir4, 1Faculty of Computer Science and Information … Continue reading
jan 06
A NEW SECRET HANDSHAKES SCHEME WITHDYNAMIC MATCHING BASED ON ZSS Preeti Kulshrestha and Arun Kumar Pal Department of Mathematics, Statistics & Computer Science G.B. Pant University of Agriculture and Technology … Continue reading
IJNSA Jan 02
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT Hasan Omar Al-Sakran Department of Management Information Systems, King Saud University, Riyadh, Saudi Arabia ABSTRACT Number of businesses using cloud computing has … Continue reading
ijnsa jan 05
STRONG ZERO-KNOWLEDGE AUTHENTICATION BASED ON THE SESSION KEYS (SASK) Younes ASIMI1 Abdellah AMGHAR2 Ahmed ASIMI3 and Yassine SADQI4 134Laboratoire des Systèmes informatiques et Vision (LabSiV), Equipe de la Sécurité, Cryptologie, … Continue reading