Vol. 2, No. 1, 2014
Contents
- Cover Page
- Inside Cover Page
- Editorial Board
- Foreword and Editorial
- Table of Contents
- Two-Phase Malicious Web Page Detection Scheme Using Misuse and Anomaly Detection
Volume 2, No. 1, 2014, 10 pages,
DOI: http://dx.doi.org/10.21742/ijria.2014.2.1.01
Authors: Suyeon Yoo and Sehun Kim
- Reliability Evaluation of Mobile Ad-hoc Networks in Case of Node Failure
Volume 2, No. 1, 2014, 14 pages,
DOI: http://dx.doi.org/10.21742/ijria.2014.2.1.02
Authors: Du Menghao, Anil Choudhary, O.P. Roy and T. Tuithung
- Updated Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Volume 2, No. 1, 2014, 8 pages,
DOI: http://dx.doi.org/10.21742/ijria.2014.2.1.03
Authors: T Dayakar, Tutut Herawan and Liu Xuejun
- Advanced Identity-Based Encryption in Cloud Computing
Volume 2, No. 1, 2014, 8 pages,
DOI: http://dx.doi.org/10.21742/ijria.2014.2.1.04
Authors: Vijaya Lakshmi Paruchuri, Ha-neul Kim and Yang Shanshan
- Copyright