Vol. 5, No. 1, 2017
Contents
- Cover Page
- Inside Cover Page
- Editorial Board
- Foreword and Editorial
- Table of Contents
- Copyright
- Location based Technique to prevent Sybil attack in wireless sensor networks
Volume 5, No. 1, 2017, 8 pages,
DOI: http://dx.doi.org/10.21742/ijria.2017.5.1.01
Authors: Chen Yu, Sonali Gupta, and Arun Agrawal
- Auditing Of Storage Security on Encryption
Volume 5, No. 1, 2017, 6 pages,
DOI: http://dx.doi.org/10.21742/ijria.2017.5.1.02
Author: Dong Jo Kim and V. Sujatha
- Cipher Text Policy Privacy Attribute-Based Security
Volume 5, No. 1, 2017, 6 pages,
DOI: http://dx.doi.org/10.21742/ijria.2017.5.1.03
Author: Bai Nan and G. Tejaswini
- A Novel Approach to detect Denial Of Service Attack in MANET
Volume 5, No. 1, 2017, 10 pages,
DOI: http://dx.doi.org/10.21742/ijria.2017.5.1.04
Author: Han Jidong, Gajendra Singh Dhakar, and Abhilash Sonker
- Gunshot Detection System for National Security
Volume 5, No. 1, 2017, 6 pages,
DOI: http://dx.doi.org/10.21742/ijria.2017.5.1.05
Author: Fan Yafeng, Aqeel Mohammed, and Marcus Lloyde George