Issue Title
Vol 26, No 1 (2017) A General Approach of Authentication Scheme and its Comparative Study Abstract  PDF
Sanjeev Kumar Mandal, A. R Deepti
Vol 19, No 1 (2015) Multicast Signcryption Method Based on Elliptic Curve for Firewalls Abstract
D. Sharmila, Naser Iqbal, Ahmad Wakeel, Noor Akdar
Vol 6, No 1 (2012) Securing Web Applications and Databases against SQL Injection Attacks Abstract
Surepeddi Gowtham
Vol 29, No 1 (2018) Performance and Security of Group Signature in Wireless Networks Abstract  PDF
Joshua J. Tom, Prof Boniface. K. Alese, Dr. Aderonke F. Thompson, Dr. Nlerum P. Anebo
1 - 4 of 4 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"