Vol 2, No 4 (2015)

Table of Contents

Vol 2, No 4 (2015)

Research Articles

Dynamic Node Recovery in MANET for High Recovery Probability
Ravneet Kaur, Neeraj Sharma
 Vol 2, No 4 (2015), Pagination: 158-164
ABSTRACT |  PDF Abstract Views: 19  |  PDF Views: 0
Prioritized and Secured Data Dissemination Technique in VANET Based on Optimal Blowfish Algorithm and Signcryption Method
M. Selvi, B. Ramakrishnan
 Vol 2, No 4 (2015), Pagination: 165-172
ABSTRACT |  PDF Abstract Views: 19  |  PDF Views: 0
Adaptive Routing Protocol based on Cuckoo Search algorithm (ARP-CS) for secured Vehicular Ad hoc network (VANET)
B. Ramakrishnan, S. R. Sreedivya, M. Selvi
 Vol 2, No 4 (2015), Pagination: 173-178
ABSTRACT |  PDF Abstract Views: 39  |  PDF Views: 0
The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case
Ntjatji Gosebo, Sipho Seepe
 Vol 2, No 4 (2015), Pagination: 188-195
ABSTRACT |  PDF Abstract Views: 21  |  PDF Views: 1
Machine-to-Machine Communications for Smart Homes
Resul Das, Gurkan Tuna
 Vol 2, No 4 (2015), Pagination: 196-202
ABSTRACT |  PDF Abstract Views: 40  |  PDF Views: 0

Review Article

Security and Fraud Issues of E-Banking
Emad Abu-Shanab, Salam Matalqa
 Vol 2, No 4 (2015), Pagination: 179-187
ABSTRACT |  PDF Abstract Views: 48  |  PDF Views: 0