1 New GSM, DCS and GSM/DCS Pifa Antennas Designs for Wireless Networks Applications por Mehadji, Abri; Tlemcen university,Belgacem, N; Tlemcen university,Belgacem, W; Tlemcen university | 6 A New Proxy Blind Signature Scheme Based on DLP por VERMA, SWATI; "Pt.Ravishankar Shukla University, Raipur(Chhattisgarh)",Sharma, Birendra Kumar; "Pt.Ravishankar Shukla University, Raipur(Chhattisgarh)" |
2 | 7 A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model por Chitrey, Anubhav; Department of Information Security & Cyber Law
Indian Institute of Information Technology
Allahabad, India,Singh, Dharmendra,Singh, Vrijendra |
3 Synthetic Feature Transformation with RBF neural network to improve the Intrusion Detection System Accuracy and Decrease Computational Costs por Asgari Taghanaki, Saeid; IAU Majlesi,Zamani Dehkordi, Behzad,Hatam, Ahmad,Bahraminejad, Behzad | 8 Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography por El Kinani, El Hassan; Groupe algèbre et Applications
Département de Mathématiques
Faculté des Sciences et Techniques
Univesité Moulay Ismaïl
Errachidia. Maroc. |
4 A Password attack on S-3 PAKE Protocol por Tallapally, Shirisha | 9 Effective Performance of Dynamic Source Routing Protocol on Random Waypoint Model (RWM) Using CBR por kumar, jogendra; CSED |
5 Developing a Secure Programming Module to cope with Modern Vulnerabilities por McKelvey, Nigel; Letterkenny Institute of Technology | 10 |