 |
An Assessment of Security in Voip Using Secret Sharing
|
K. Maheswari, M. Punithavalli
|
pp.
1-5
|
DOI:
10.5923/j.ijnc.20110101.01 10406 Views 5611 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
A Research on Performance Evaluation for Some Cipher Models Based on Analytical Survey
|
Raj Kumar, V. K. Saraswat
|
pp.
14-17
|
DOI:
10.5923/j.ijnc.20110101.03 12201 Views 2798 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Fading Channel with Orthogonal Multi-carrier Code Division Multiple Access Signal
|
Issam Trrad, Amjad Hindi, Ziad Sobih
|
pp.
18-22
|
DOI:
10.5923/j.ijnc.20110101.04 12190 Views 5913 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Aspect in Network Security Risk: A System Ruin Problem
|
Hoa Tran
|
pp.
23-25
|
DOI:
10.5923/j.ijnc.20110101.05 9834 Views 4989 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|