Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
International Journal of Computer (IJC)
About
About the Journal
Editorial Team
Submissions
Contact
Current
Archives
Call for Papers 2024: February
Announcements
Register
Login
Home
/
Search
Search
Search articles for
Advanced filters
Published After
Year
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Month
January
February
March
April
May
June
July
August
September
October
November
December
Day
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Published Before
Year
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Month
January
February
March
April
May
June
July
August
September
October
November
December
Day
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
By Author
Search
Search Results
Found 19 items.
Data Security in Cloud Computing with Elliptic Curve Cryptography
Abdulkadir Abdullahi Ibrahim, Dr. Wilson Cheruiyot, Dr. Michael W. Kimwele
1-14
2017-06-21
Responding to and Preventing Threats to Cybersecurity When Utilizing the Internet of Things
Jaipratap Singh Grewal
70-77
2018-08-24
In the Cloud Storage Market How Users are Using it without Hesitation (Report 2016)
A. Rob Md. Rayhan Hossain, G. M. Israfil Islam, Md. Shahinurzzaman, Md. Alam Hossain
30-34
2016-04-26
Performance and Security of Group Signature in Wireless Networks
Joshua J. Tom, Prof Boniface. K. Alese, Dr. Aderonke F. Thompson, Dr. Nlerum P. Anebo
82-98
2018-04-24
Hough Transform and Chi-Square-Based Iris Recognition
Olabode Olatubosun, Iwasokun Gabriel Babatunde, Oluwadare Samuel Adebayo, Adeniyi Tunde Taiwo
1-15
2016-04-05
Holistic Approach to Big Data Definition using Analysis of Facts
Akande Oyebola, Osofisan Adenike, Adekola Olubukola
34-41
2018-10-14
Next Generation AI-Based Firewalls: a Comparative Study
Sina Ahmadi
245-262
2023-12-31
Examining the Advantages of Artificial Intelligence Alongside Its Potential Risks on Human Wellbeing, Data Privacy, and National Security
Olushola Agbaje
107-137
2023-10-30
A Validity of in-Vehicle Networks Using CAN-FD
Sukhyun Seo
64-73
2023-09-27
Cyber Security Challenges to Mobile Banking in SACCOs in Kenya
Nambiro Alice Wechuli, Wabwoba Franklin, Wasike Jotham
133-140
2017-10-18
Role of RFID Technology in Engineering Applications
Vivek Kumar, Trisha Singh, Pooja Dagar , Jyoti Dagar, Dr Rashmi Agarwal
26-36
2023-04-28
A Comparison of Window 8 and Linux Operating System (Android) Security for Mobile Computing
Sumat Nazeer, Faisal Bahadur, Arif Iqbal, Ghazala Ashraf, Shahid Hussain
21-29
2015-07-15
A Framework for Improving Computer-based Information Systems Auditing
Yusuf Sheikh Khalif Abdirahman
146-151
2017-08-07
Review on Blockchain Technology for Healthcare Records
Ekram Ahmed Ali Mirdah, Sokchoo Ng, Khiam Ping Chih
39-45
2019-05-06
The Role of Data Mining in Information Security
Osman Mohamed Abbas, Mohamed Elhafiz Mustafa, Siddig Balal Ibrahim
1-20
2015-06-05
Securing the IP Multimedia Subsystem with IPsec and HTTP Digest
Mohammed Ibrahim Omar, Dr. Cheruiyot W. Kipruto, Dr. Michael W. Kimwele
117-128
2017-07-30
The Least Significant Two-bit Substitution Algorithm for Image Steganography
Serdar Solak, Umut Altinişik
150-156
2018-01-03
Skin Tone Based Secret Data Hiding in Images Using Wavelet Transform
JEEVAN KISHOR GANGEPOGU, Harini Vemula
1-8
2013-10-17
Development of a Secure Mobile E-Banking System
Raphael Olufemi Akinyede, Odoseiye Aidohelen Esese
23-42
2017-07-04
1 - 19 of 19 items
Developed By
Open Journal Systems
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians
Browse
Current Issue