International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 

 

Transaction-based QoS management in a Hybrid Wireless Superstore Environment

Shankaraiah,Pallapa Venkataram

Abstract | References | Full Paper: PDF (Size:437KB), PP.1-11, Pub. Date: 2011-3-17

DOI: 10.5815/ijcnis.2011.02.01


 

Semi-Distributed Coordinative Switch Beamforming with Power Scheduling

Ying Liu, Fangjiong Chen, Fei Ji,Xiaodong Chen,Shangkun Xiong

Abstract | References | Full Paper:PDF (Size:280KB), PP.12-18, Pub. Date: 2011-3-17

DOI: 10.5815/ijcnis.2011.02.02

 

 

A New Secure Strategy in Small-Scale IEEE 802.11 Wireless Local Area Networks with Web Authentication and Virtual Local Area Network

Huiting Liu,Hua Zhang,Weilin Xu,Yigang Yang,Mengyuan Xu

Abstract | References | Full Paper: PDF (Size:254KB), PP.19-25, Pub. Date: 2011-3-17

DOI: 10.5815/ijcnis.2011.02.03

 

 

Securing the Distributions in P2P Networks with Trusted Platform Modules

Hao Li,Yu Qin,Qianying Zhang,Shijun Zhao

Abstract | References | Full Paper: PDF (Size:602KB), PP.26-33, Pub. Date: 2011-3-17

DOI: 10.5815/ijcnis.2011.02.04

 

 

A Secure Method for Network Coding-based Reprogramming Protocols in Wireless Sensor Networks

Yu Zhang,Xing She Zhou,Yee Wei Law,Marimuthu Palaniswami

Abstract | References | Full Paper: PDF (Size:218KB), PP.34-40, Pub. Date: 2011-3-17

DOI: 10.5815/ijcnis.2011.02.05

 

 

Design and Application of A New Hybrid Heuristic Algorithm for Flow Shop Scheduling

Fang Wang ,Yun-qing Rao,Fang Wang,Yu Hou

Abstract | References | Full Paper: PDF (Size:302KB), PP.41-49, Pub. Date: 2011-3-17

DOI: 10.5815/ijcnis.2011.02.06

 

 

Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage

Xi Chen,Yong Li

Abstract | References | Full Paper: PDF (Size:185KB), PP.50-56, Pub. Date: 2011-3-17

DOI: 10.5815/ijcnis.2011.02.07

 

 

The Research of Unconditionally Secure Authentication Code For Multi-Source Network Coding

Hong Yang,Mingxi Yang

Abstract | References | Full Paper: PDF (Size:159KB), PP.57-63, Pub. Date: 2011-3-17

DOI: 10.5815/ijcnis.2011.02.08