INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

DOI: 10.5815/ijcnis

Published By: MECS Press

IJCNIS Vol. 5, No. 2, Feb. 2013

Cover page and Table of Contents: PDF (size: 127KB)

Contents

REGULAR PAPERS

  • Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries

    Jaskanwal Minhas,Raman Kumar

    DOI: 10.5815/ijcnis.2013.02.01

  • FPGA Based A New Low Power and Self-Timed AES 128-bit Encryption Algorithm for Encryption Audio Signal

    Bahram Rashidi,Bahman Rashidi

    DOI: 10.5815/ijcnis.2013.02.02

  • Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems

    Vadym Mukhin,Artem Volokyta

    DOI: 10.5815/ijcnis.2013.02.03

  • Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP

    Sounak Paul,Bimal Kumar Mishra

    DOI: 10.5815/ijcnis.2013.02.04

  • Digital Image Scrambling Based on Two Dimensional Cellular Automata

    Fasel Qadir,M. A. Peer,K. A. Khan

    DOI: 10.5815/ijcnis.2013.02.05

  • A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature

    V.K. Narendira Kumar,B. Srinivasan

    DOI: 10.5815/ijcnis.2013.02.06

  • Study the One-bit Hard Combination Scheme on Cognitive Radio Users

    Md. Shamim Hossain,Mohammad Mamunur Rashid,Md. Nazrul Islam,Md. Abdullah-Al-Mashud,Md. Nurul Islam

    DOI: 10.5815/ijcnis.2013.02.07

  • Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management

    Abd El–Naser A. Mohammed,Ahmed Nabih Zaki Rashed,Osama S. Fragallah,Mohamed G. El-Abyad

    DOI: 10.5815/ijcnis.2013.02.08