International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis
Published By: MECS Press
IJCNIS Vol. 11, No. 5, May. 2019
Cover page and Table of Contents: PDF (size: 174KB)
Contents
REGULAR PAPERS
-
Construction for Searchable Encryption with Strong Security Guarantees
István Vajda
Abstract | References | Full Paper: PDF (Size:417KB), PP.1-10, Pub. Date: 2019-05-08
DOI: 10.5815/ijcnis.2019.05.01
-
IAMIN: An Infrastructure-aware Middleware for the Reconfiguration of Unstructured Peer-to-Peer Overlay Networks
Morteza Alizadeh, Arash Ghafouri, Mohsen Sharifi
Abstract | References | Full Paper: PDF (Size:909KB), PP.11-19, Pub. Date: 2019-05-08
DOI: 10.5815/ijcnis.2019.05.02
-
Distributed Wormhole Attack Mitigation Technique in WSNs
Sharada Kori, Krishnamurthy G N, Nandini Sidnal
Abstract | References | Full Paper: PDF (Size:774KB), PP.20-27, Pub. Date: 2019-05-08
DOI: 10.5815/ijcnis.2019.05.03
-
A Passive Approach for Detecting Image Splicing using Deep Learning and Haar Wavelet Transform
Eman I. Abd El-Latif, Ahmed Taha, Hala H. Zayed
Abstract | References | Full Paper: PDF (Size:687KB), PP.28-35, Pub. Date: 2019-05-08
DOI: 10.5815/ijcnis.2019.05.04
-
Multicopy Energy Aware Distance and Inter-Contact Delay Routing (EDICDR) Approach for Delay Tolerant Networks
Savita, D. K. Lobiyal
Abstract | References | Full Paper: PDF (Size:478KB), PP.36-42, Pub. Date: 2019-05-08
DOI: 10.5815/ijcnis.2019.05.05
-
Cluster based Routing Protocols for IOT Application
Anna Merine George, S.Y Kulkarni, Vice Chancellor
Abstract | References | Full Paper: PDF (Size:1022KB), PP.43-49, Pub. Date: 2019-05-08
DOI: 10.5815/ijcnis.2019.05.06