The International Arab Journal of Information Technology (IAJIT)

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

Efficient Modified Elliptic Curve Diffie-Hellman

Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years. 

Hierarchical Based Group Key Transfer for Secure

1Department of Information Science and Technology, A nna University, India

Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol

Department of Electronics Engineering, Anna Univers ity, India. 2Department of Information Technology, Thiagarajar C ollege of Engineering, India. 

AlSakibPathan1,MuhammadMonowar2,Md.Rabbi3,MuhammadAlam1,andChoongHong11DepartmentofComputerEngineering,KyungHeeUnive rsity,SouthKorea2DepartmentofComputerScienceandEngineering,UniversityofChittagong,Bangladesh3CSEDepartments,ShahjalalUniversityofScienceandTechnology,Bangladesh