IJCNC 05
DELAY AND THROUGHPUT AWARE CROSS LAYER TDMA APPROACH INWSN BASED IOT NETWORKS BOUDI Raid 1 ,GHERBI Chirihane 2 and ALIOUAT Zibouda 21 LIRE Laboratory of Constantine 2, Abdelhafid Boussouf UniversityCenter … Continue reading
IJCNC 06
Ecient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their Applications in Post-Quantum Cryptography Mohammed El Baraka and Siham EzzouakFaculty of sciences Dhar Al Mahraz, Sidi Mohammed Ben Abdellah University, FEZ, … Continue reading
IJNSA 02
Delay Testing in Integrated Circuits: Methodologies for Path Delay Fault Detection and Hardware Security Palanichamy Manikandan Institute of Engineering, Østfold University College, Fredrikstad, Norway ABSTRACT As semiconductor technology advances, high-speed … Continue reading
IJCNC 08
DEVELOPING A SECURE AND TRANSPARENTBLOCKCHAIN SYSTEM FOR FINTECH WITHFINTRUST FRAMEWORK Avinash Singh1 ,Vikas Pareek 1, Ashish Sharma 21 Department of Computer Science and Information Technology, Mahatma GandhiCentral University, East Champaran, … Continue reading
IJCNC 07
VISUALLY IMAGE ENCRYPTION AND COMPRESSION USING A CNN BASEDAUTO ENCODER Mahdi Madani and El-Bay Bourennane ImViA Laboratory(EA 7535), Université Bourgogne Europe,21000 Dijon, France ABSTRACT This paper proposes a visual encryption … Continue reading
IJCNC 03
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks Chandimal Jayawardena, Jay Chen, Amay Bhalla, and Lin Bui STEM, University of South Australia, Adelaide, SA, 5095, Australia. Abstract … Continue reading
IJCNC 08
A NOVEL CLUSTER HEAD SELECTION ALGORITHM TO MAXIMIZE WIRELESS SENSOR NETWORK LIFESPAN Almamoon Alauthman 1 , Wan NorShuhadah Wan Nik 2 1 Electrical Engineering Department, Al-Balqa Applied University, As Salt … Continue reading
IJCNC 06
LOAD BALANCED ATTACK DEFENSE SYSTEM WITHLIGHTWEIGHT AUTHENTICATION AND MODIFIEDBLOCKCHAIN IN SDN FOR B5G Ihsan H. Abdulqadder and Israa T. Aziz Department of Computer Science, University of Kirkuk, Kirkuk, IraqComputer Center, … Continue reading
IJCNC 05
ELLIPTIC CURVE CRYPTOGRAPHY ALGORITHM WITH RECURRENT NEURAL NETWORKS FOR ATTACK DETECTION IN INDUSTRIAL IOT Bebin Josey T 1, D.S.Misbha 21 Department of Computer Science, Nesamony Memorial Christian College Marthandam,Manonmanium Sundaranar … Continue reading