The International Arab Journal of Information Technology (IAJIT)

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

Efficient Modified Elliptic Curve Diffie-Hellman

Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years. 
#

Hierarchical Based Group Key Transfer for Secure

1Department of Information Science and Technology, A nna University, India
#

Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol

Department of Electronics Engineering, Anna Univers ity, India. 2Department of Information Technology, Thiagarajar C ollege of Engineering, India. 

AlSakibPathan1,MuhammadMonowar2,Md.Rabbi3,MuhammadAlam1,andChoongHong11DepartmentofComputerEngineering,KyungHeeUnive rsity,SouthKorea2DepartmentofComputerScienceandEngineering,UniversityofChittagong,Bangladesh3CSEDepartments,ShahjalalUniversityofScienceandTechnology,Bangladesh