The International Arab Journal of Information Technology (IAJIT)

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

Efficient Modified Elliptic Curve Diffie-Hellman

Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years. 
#

Hierarchical Based Group Key Transfer for Secure

1Department of Information Science and Technology, A nna University, India
#