Proper
Home
Journals
About Us
Contact
About this Journal
|
Author Guidelines
|
Submit a Manuscript
Journal Menu
» About this Journal
» Aim and Scope
» Bibliographic Information
» Journal Editors
» Authors Guidelines
» Ethical Policy
» Journal Review Policy
» Online Submission
» Special Issue
» Call for Papers
» Contact Information
Browse Issue
Vol.15, No.1, 2020
Vol.14, No.2, 2019
Vol.14, No.1, 2019
Vol.13, No.4, 2018
Vol.13, No.3, 2018
Vol.13, No.2, 2018
Vol.13, No.1, 2018
Vol.12, No.12, 2017
Vol.12, No.11, 2017
Vol.12, No.10, 2017
Vol.12, No.9, 2017
Vol.12, No.8, 2017
Vol.12, No.7, 2017
Vol.12, No.6, 2017
Vol.12, No.5, 2017
Vol.12, No.4, 2017
Vol.12, No.3, 2017
Vol.12, No.2, 2017
Vol.12, No.1, 2017
Volumes 2006-2016
Vol. 2, No. 1, 2007
Authentication Protocol for Heterogeneous Networks
DOI:
http://dx.doi.org/10.14257/ijmue.2007.2.1.01
by: Maricel O. Balitanas and Rosslin Robles
Privacy Protection for the Vulnerabilities in Active Networks
DOI:
http://dx.doi.org/10.14257/ijmue.2007.2.1.02
by: Jaegu Song and Prof. Seok-soo Kim
Security Management against DDOS attack in Medical Systems Architecture
DOI:
http://dx.doi.org/10.14257/ijmue.2007.2.1.03
by: Samir Kumar Bandyopadhyay
Ubiquitous Computing Environment Threats and Defensive Measures
DOI:
http://dx.doi.org/10.14257/ijmue.2007.2.1.04
by: Dr. Byeong-Ho KANG
Contact Us
PO Box 5074, Sandy Bay Tasmania 7005, Australia
Phone:
+61 3 9028 5994