|
An Assessment of Security in Voip Using Secret Sharing
|
K. Maheswari, M. Punithavalli
|
pp.
1-5
|
DOI:
10.5923/j.ijnc.20110101.01 9951 Views 5260 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
A Research on Performance Evaluation for Some Cipher Models Based on Analytical Survey
|
Raj Kumar, V. K. Saraswat
|
pp.
14-17
|
DOI:
10.5923/j.ijnc.20110101.03 11906 Views 2661 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
Fading Channel with Orthogonal Multi-carrier Code Division Multiple Access Signal
|
Issam Trrad, Amjad Hindi, Ziad Sobih
|
pp.
18-22
|
DOI:
10.5923/j.ijnc.20110101.04 11994 Views 5801 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
Aspect in Network Security Risk: A System Ruin Problem
|
Hoa Tran
|
pp.
23-25
|
DOI:
10.5923/j.ijnc.20110101.05 9551 Views 4858 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|