International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

DOI: 10.5815/ijcnis

Published By: MECS Press

IJCNIS Vol. 7, No. 7, Jun. 2015

Cover page and Table of Contents: PDF (size: 667KB)



  • An Ultra-secure Router-to-router Spontaneous Key Exchange System

    Pramode K. Verma, Mayssaa El Rifai

    DOI: 10.5815/ijcnis.2015.07.01

  • A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning

    Alaeddin Almubayed, Ali Hadi, Jalal Atoum

    DOI: 10.5815/ijcnis.2015.07.02

  • An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys

    Ali M. Meligy, Mohammed M. Nasef, Fatma T. Eid

    DOI: 10.5815/ijcnis.2015.07.03

  • Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing

    Prakash G L, Manish Prateek, Inder Singh

    DOI: 10.5815/ijcnis.2015.07.04

  • A Survey on RC4 Stream Cipher

    Poonam Jindal, Brahmjit Singh

    DOI: 10.5815/ijcnis.2015.07.05

  • (N, N) Secret Color Image Sharing Scheme with Dynamic Group

    Mohamed Fathimal. P, Arockia Jansi Rani .P

    DOI: 10.5815/ijcnis.2015.07.06

  • Analysis of Base Station Assisted Novel Network Design Space for Edge-based WSNs

    Muni Venkateswarlu K., A. Kandasamy, Chandrasekaran K.

    DOI: 10.5815/ijcnis.2015.07.07

  • New Region Growing based on Thresholding Technique Applied to MRI Data

    A. Afifi, S. Ghoniemy, E.A. Zanaty, S. F. El-Zoghdy

    DOI: 10.5815/ijcnis.2015.07.08