International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 
   

DNA-Genetic Encryption Technique

Hamdy M. Mousa

Abstract | References | Full Paper: PDF (Size:1784KB), PP.1-9, Pub. Date: 2016-7-8

DOI: 10.5815/ijcnis.2016.07.01

 
   

Improving the Performance of Routing Protocol using Genetic Algorithm

Meenakshi Moza, Suresh Kumar

Abstract | References | Full Paper: PDF (Size:457KB), PP.10-16, Pub. Date: 2016-7-8

DOI: 10.5815/ijcnis.2016.07.02

 
   

Spam Reduction by using E-mail History and Authentication (SREHA)

Adwan F. Yasin

Abstract | References | Full Paper: PDF (Size:457KB), PP.17-22, Pub. Date: 2016-7-8

DOI: 10.5815/ijcnis.2016.07.03

 
   

Password Security: An Analysis of Password Strengths and Vulnerabilities

Katha Chanda
Abstract | References | Full Paper: PDF (Size:335KB), PP.23-30, Pub. Date: 2016-7-8

DOI: 10.5815/ijcnis.2016.07.04

 
   

Vertical Handoff Decision Algorithm Based on PRSS and Dwell Time

Jyoti Madaan, Indu Kashyap

Abstract | References | Full Paper: PDF (Size:978KB), PP.31-42, Pub. Date: 2016-7-8

DOI: 10.5815/ijcnis.2016.07.05

 
   

An Efficient Position based Power Aware Routing Algorithm in Mobile Ad-hoc Networks

Md. Mahbubur Rahman, Md. Akhtaruzzaman

Abstract | References | Full Paper: PDF (Size:766KB), PP.43-49, Pub. Date: 2016-7-8

DOI: 10.5815/ijcnis.2016.07.06

 
   

Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks

Yasmine Medjadba, Somia Sahraoui

Abstract | References | Full Paper: PDF (Size:643KB), PP.50-60, Pub. Date: 2016-7-8

DOI: 10.5815/ijcnis.2016.07.07

 
   

Realization of Efficient High Throughput Buffering Policies for Network on Chip Router

Liyaqat Nazir, Roohie Naaz Mir

Abstract | References | Full Paper: PDF (Size:426KB), PP.61-70, Pub. Date: 2016-7-8

DOI: 10.5815/ijcnis.2016.07.08