International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis
Published By: MECS Press
IJCNIS Vol. 8, No. 8, Aug. 2016
Cover page and Table of Contents: PDF (size: 171KB)
Contents
REGULAR PAPERS
-
Modelling and Implementation of Network Coding for Video
Can Eyupoglu, Ugur Yesilyurt
Abstract | References | Full Paper: PDF (Size:1691KB), PP.1-10, Pub. Date: 2016-08-08
DOI: 10.5815/ijcnis.2016.08.01
-
A Specialized Lightweight Metamorphic Function for KASUMI Metamorphic Cipher and Its FPGA Implementation
Rabie A. Mahmoud, A. Baith Mohamed
Abstract | References | Full Paper: PDF (Size:984KB), PP.11-19, Pub. Date: 2016-08-08
DOI: 10.5815/ijcnis.2016.08.02
-
A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique
Fatemeh. Dehghani, Shahram. Darooei
Abstract | References | Full Paper: PDF (Size:568KB), PP.20-26, Pub. Date: 2016-08-08
DOI: 10.5815/ijcnis.2016.08.03
-
Vertical Handoff with Predictive Received Signal Strength in Next Generation Wireless Network
Jyoti Madaan, Indu Kashyap
Abstract | References | Full Paper: PDF (Size:739KB), PP.27-38, Pub. Date: 2016-08-08
DOI: 10.5815/ijcnis.2016.08.04
-
Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique
Abhishek Bansal, Sunil K. Muttoo, Vinay Kumar
Abstract | References | Full Paper: PDF (Size:839KB), PP.39-46, Pub. Date: 2016-08-08
DOI: 10.5815/ijcnis.2016.08.05
-
Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment
E.Suresh Babu, C. Nagaraju, MHM Krishna Prasad
Abstract | References | Full Paper: PDF (Size:808KB), PP.47-58, Pub. Date: 2016-08-08
DOI: 10.5815/ijcnis.2016.08.06
-
Cuckoo Genetic Optimization Algorithm for Efficient Job Scheduling with Load Balance in Grid Computing
Rachhpal Singh
Abstract | References | Full Paper: PDF (Size:611KB), PP.59-66, Pub. Date: 2016-08-08
DOI: 10.5815/ijcnis.2016.08.07
-
A Study of Hyperelliptic Curves in Cryptography
Reza Alimoradi
Abstract | References | Full Paper: PDF (Size:476KB), PP.67-72, Pub. Date: 2016-08-08
DOI: 10.5815/ijcnis.2016.08.08