Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 98
Date | Title | Author(s) |
20-Nov-2019 | An Analysis of Trust, Distrust, and Their Antecedents: Development of a Comprehensive Model of Consumer Intentions in Technology-Driven Transactions | Simon, Steven John; Cagle, Carol J. |
20-Nov-2019 | Secure WLAN Handoff Scheme with Continuous Authentication | Singh, Rajeev; Sharma, Teek P. |
20-Nov-2019 | Metamorphic Malware Detection Using Function Call Graph Analysis | Deshpande, Prasad; Stamp, Mark |
20-Nov-2019 | Probabilistic Approach of Improved Binary PSO Algorithm Using Mobile Sink Nodes | Anand, S. Raj; Kannan, E. |
20-Nov-2019 | Editor`s Introduction | Li, Eldon Y. |
16-Aug-2016 | Development of an In-House Grid Testbed Supporting Scheduling and Execution of Scientific Workflows | Prajapati, Harshadkumar B.;Shah, Vipul A. |
16-Aug-2016 | Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem | Adebayo, Olawale S.;Olalere, Morufu;Ugwu, Joel N. |
16-Aug-2016 | Antecedents and Consequences of Trust in Using Mobile Banking | Yu, Chian-Son |
16-Aug-2016 | Exploring the Role of Culture in eWOM Adoption | Pentina, Iryna;Basmanova, Oksana;Zhang, Lixuan;Ukis, Yuliya |
16-Aug-2016 | Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm | Kuppuswamy, Prakash;Saeed, Q. Y. Al-Khalidi |
16-Aug-2016 | A Discrete Formulation of Successive Software Releases Based on Imperfect Debugging | Singh, Jagvinder;Anand, Adarsh;Kumar, Avneesh;Khatri, Sunil Kumar |
16-Aug-2016 | Data Management Issues and Data Mining of Real Time System Application for Environment Monitoring | Saini, Dinesh Kumar;Maskari, Sanad Al |
16-Aug-2016 | Insights into Motivation to Participate in Online Surveys | Foster, Mary K.;Michon, Richard |
16-Aug-2016 | Modelling e-Health Systems Security Requirements: A Business Process Based Approach | Alahmadi, Ahmed H.;Soh, Ben;Ullah, Azmat |
16-Aug-2016 | Detection and Analysis of Security Vulnerabilities in Java | Kumar, Ch. Aswani;Charitha, M. Sai |
16-Aug-2016 | Exploring Donation Appeals in Top Not-for-Profit Websites | Pitts, Robert E.;Blose, Julia E.;Mack, Rhonda W. |
16-Aug-2016 | Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm | Kuppuswamy, Prakash;Saeed, Q. Y. Al-Khalidi |
16-Aug-2016 | Securing DNA Information through Public Key Cryptography | Tripathi, Shiv P. N.;Jaiswal, Manas;Singh, Vrijendra |
16-Aug-2016 | On Measuring and Increasing the Effectiveness of Banner Advertising | Ghosh, Haren;Bhatnagar, Amit |
16-Aug-2016 | Posting Articles for Occupational Stress Reduction in Social Networking Sites: A View of Social Cognitive Theory | Yen, Yung-Shen |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 98