International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 

 

Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals

Zhukov Igor,Mikhaylov Dmitry,Starikovskiy Andrey,Kuznetsov Dmitry,Tolstaya Anastasia,Zuykov Alexander

Abstract | References | Full Paper: PDF (Size:181KB), PP.1-8, Pub. Date: 2013-4-16

DOI: 10.5815/ijcnis.2013.05.01


 

The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity

Shafi'í Muhammad Abdulhamid,Olawale Surajudeen Adebayo,Damian Oshomah Ugiomoh,Mohammed Danlami AbdulMalik

Abstract | References | Full Paper: PDF (Size:911KB), PP.9-18, Pub. Date: 2013-4-16

DOI: 10.5815/ijcnis.2013.05.02

 

 

Criteria Specifications for the Comparison and Evaluation of Access Control Models

Shabnam Mohammad Hasani,Nasser Modiri

Abstract | References | Full Paper: PDF (Size:468KB), PP.19-29, Pub. Date: 2013-4-16

DOI: 10.5815/ijcnis.2013.05.03

 

 

Biometric Passport Validation Scheme using Radio Frequency Identification

V.K. Narendira Kumar,B. Srinivasan

Abstract | References | Full Paper: PDF (Size:436KB), PP.30-39, Pub. Date: 2013-4-16

DOI: 10.5815/ijcnis.2013.05.04

 

 

A Bespoke Technique for Secret Messaging

Mahimn Pandya,Hiren Joshi,Ashish Jani

Abstract | References | Full Paper: PDF (Size:1398KB), PP.40-46, Pub. Date: 2013-4-16

DOI: 10.5815/ijcnis.2013.05.05

 

 

Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System

G.Velmayil,S.Pannirselvam

Abstract | References | Full Paper: PDF (Size:263KB), PP.47-54, Pub. Date:2013-4-16

DOI: 10.5815/ijcnis.2013.05.06

 

 

Recent Replica Placement Algorithms in P2P Networks – A Review

Kala Karun. A,Jayasudha. J. S

Abstract | References | Full Paper: PDF (Size:234KB), PP.55-63, Pub. Date: 2013-4-16

DOI: 10.5815/ijcnis.2013.05.07

 

 

Effect of Black Hole Attack on MANET Routing Protocols

Jaspal Kumar,M. Kulkarni,Daya Gupta

Abstract | References | Full Paper: PDF (Size:412KB), PP.64-72, Pub. Date: 2013-4-16

DOI: 10.5815/ijcnis.2013.05.08