About this Journal  |  Author Guidelines  |   Submit a Manuscript     

Vol. 3, No. 2, 2016

Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • Copyright
  • Security for files in Operating System
    by: G Sai Asritha
    DOI: http://dx.doi.org/10.21742/ijstsd.2016.3.2.01
  • Analysis of Cryptography Techniques over Block Cipher
    by: Kyongjin Kim
    DOI: http://dx.doi.org/10.21742/ijstsd.2016.3.2.02
  • Hybrid Authentication for Secure Data
    by: Kyoung-Sik Min
    DOI: http://dx.doi.org/10.21742/ijstsd.2016.3.2.03
  • Prevention Methods to defeat Jamming Attacks
    by: Jae Jung Kim
    DOI: http://dx.doi.org/10.21742/ijstsd.2016.3.2.04
 

Contact Us

  • PO Box 5074, Sandy Bay Tasmania 7005, Australia
  • Phone: +61 3 9028 5994