1 Improved G-3PAKE Protocol with Formal Verification por Sanghi, Manju | 6 Developing a Secure Programming Module to cope with Modern Vulnerabilities por McKelvey, Nigel; Letterkenny Institute of Technology |
2 New GSM, DCS and GSM/DCS Pifa Antennas Designs for Wireless Networks Applications por Mehadji, Abri; Tlemcen university,Belgacem, N; Tlemcen university,Belgacem, W; Tlemcen university | 7 A New Proxy Blind Signature Scheme Based on DLP por VERMA, SWATI; "Pt.Ravishankar Shukla University, Raipur(Chhattisgarh)",Sharma, Birendra Kumar; "Pt.Ravishankar Shukla University, Raipur(Chhattisgarh)" |
3 | 8 A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model por Chitrey, Anubhav; Department of Information Security & Cyber Law
Indian Institute of Information Technology
Allahabad, India,Singh, Dharmendra,Singh, Vrijendra |
4 Synthetic Feature Transformation with RBF neural network to improve the Intrusion Detection System Accuracy and Decrease Computational Costs por Asgari Taghanaki, Saeid; IAU Majlesi,Zamani Dehkordi, Behzad,Hatam, Ahmad,Bahraminejad, Behzad | 9 Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography por El Kinani, El Hassan; Groupe algèbre et Applications
Département de Mathématiques
Faculté des Sciences et Techniques
Univesité Moulay Ismaïl
Errachidia. Maroc. |
5 A Password attack on S-3 PAKE Protocol por Tallapally, Shirisha | 10 Effective Performance of Dynamic Source Routing Protocol on Random Waypoint Model (RWM) Using CBR por kumar, jogendra; CSED |