To search, Click below search items.
All Published Papers Search Service
Title
Check Points against Privacy Breaches in Android Applications
Author
Kazuhide Fukushima, Lujo Bauer, Limin Jia, Shinsaku Kiyomoto, Yutaka Miyake
Vol. 12 No. 8 pp. 1-10
Keywords
Information-flow analysis, Software Verification, System Security, Software Security, Android Security
A Novel Approach for Anonymous Secure Routing In Mobile Ad Hoc Network Using Cryptography
Kim, Do-Moon
Vol. 12 No. 7 pp. 121-128
Secure Routing Mobile Ad Hoc Networks, Anonymity, Cryptography, On-demand Routing, Pseudonmity
Implementation of ZVS Concept in Four Wire Inverter for UPS Fed (Unbalanced) Star Connected Load
R.Senthil Kumarm, Jovitha Jerome
Vol. 12 No. 7 pp. 112-120
Four wire inverter, PLL, Soft Switching, THD, UPS
Throughput Gain using Threshold-based Multiuser Scheduling in WiMAX OFDMA
Ahmed Iyanda Sulyman
Vol. 12 No. 7 pp. 106-111
WiMAX OFDMA, Threshold-based selection, PUSC, scheduling