Previous Issue

PDF Icon

A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification

Author/s:  Safarian Nejad Maryam, Mohammad V. Malakooti, Navid Hashemi Taba
Pages:  137-142   /   DOI:  http://dx.doi.org/10.17781/P002616
PDF Icon

An Application-centric Trust Management Framework for Mobile Ad Hoc Networks

Author/s:  Thulani Phakathi, Francis Lugayizi, B. Esiefarhenrhe, Bassey Isong
Pages:  143-156   /   DOI:  http://dx.doi.org/10.17781/P002620
PDF Icon

Implementation of Proof of Retrievability on the Cloud

Author/s:  Kosmas Kapis, Baraka Mwasampeta
Pages:  157-164   /   DOI:  http://dx.doi.org/10.17781/P002622
PDF Icon

Efficient FPGA Implementation of Lightweight Authenticated Encryption and Authenticated Key Distribution Methods for IoT Security

Author/s:  Abiy Tadesse Abebe
Pages:  165-186   /   DOI:  http://dx.doi.org/10.17781/P002633