Computer and Network Security
 
Number Author Country Title
432 M. Bani Yassein, M. Bani Khalaf  Jordan Performance Evolution Of Multiple Probabilities Of Ad-Hoc On Demand Distance Victor Protocol (AODV)

470

Jun-qing Li, Xin-you Li, Sheng-xian Xie, Chen Chen, China Time-Constraint Role-Based Access Control In Peer-To-Peer Networks

475

Shadi Aljawarneh and Faisal Alkhateeb  Jordan

A Semanticweb Technology-Based Architecture For New Server-Side Data Validation Inweb Applications

487

Faisal Al-Hawi, Chan Yeob Yeun, Mahmoud Al-Qutayti,

UAE

Security Challenges For Emerging VANEts

490

Mohamed N. El-Eskandrani, Ehab F. Badran and Darwish A. Mohamed

Egypt Investigation Of The Performance Of The Wavelet Packet Based Multi-Carrier CDMA Communications In Rayleigh Fading Channel
491

Essam Al daoud, Ahid  Al-Shbail, Adnan M. Al-Smadi,

Jordan

Detecting Metamorphic Viruses By Using Arbitrary Length Of Control Flow Graphs And Nodes Alignment

509 Amir H. Chinaei, Ken Barker, Frank Wm. Tompa Canada

Space Of Access Control Administration Models

590 Khaled M. Suwais, Azman Samsudin Malaysia

Comprehensive Survey On The Constructional Design Of Existing Stream Ciphers

604 Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly AUE

Security, Privacy, Authentication In RFID And Applications Of Smart E-Travel


<< Back