International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis


Published By: MECS Publisher








Exponential Brute-Force Complexity of A Permutation Based Stream Cipher

Mohammed Omari,Hamdy S. Soliman

Abstract | References | Full Paper: PDF (Size:1208KB), PP.1-13, Pub. Date: 2013-1-4

DOI: 10.5815/ijcnis.2013.01.01


Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

IBalasaheb N. Jagdale,Nileema S. Gawande

Abstract | References | Full Paper: PDF (Size:888KB), PP.14-23, Pub. Date: 2013-1-4

DOI: 10.5815/ijcnis.2013.01.02



Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks


Abstract | References | Full Paper: PDF (Size:2178KB), PP.24-32, Pub. Date: 2013-1-4

DOI: 10.5815/ijcnis.2013.01.03



Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks


Abstract | References | Full Paper: PDF (Size:342KB), PP.33-40, Pub. Date: 2013-1-4

DOI: 10.5815/ijcnis.2013.01.04



Implementation of An Optimized and Pipelined Combinational Logic Rijndael S-Box on FPGA

Bahram Rashidi,Bahman Rashidi

Abstract | References | Full Paper: PDF (Size:556KB), PP.41-48, Pub. Date: 2013-1-4

DOI: 10.5815/ijcnis.2013.01.05



Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

Poonam Jindal,Brahmjit Singh

Abstract | References | Full Paper: PDF (Size:421KB), PP.49-55, Pub. Date:2013-1-4

DOI: 10.5815/ijcnis.2013.01.06



An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

Harjot Bawa,Parminder Singh,Rakesh Kumar

Abstract | References | Full Paper: PDF (Size:1160KB), PP.56-64, Pub. Date: 2013-1-4

DOI: 10.5815/ijcnis.2013.01.07



Blactr: A Technique to Revoke the Misbehaving Users with TTP

IH.Jayasree,A. Damodaram

Abstract | References | Full Paper: PDF (Size:621KB), PP.65-78, Pub. Date: 2013-1-4

DOI: 10.5815/ijcnis.2013.01.08