The International Arab Journal of Information Technology (IAJIT)

Smelling the Web Olfactory Display for Web

Saad Abid2, Zhiyong Li1, and Renfa Li1 1College of Information Science and Engineering, Hun an University, China 2Department of Computer Science and Informatics, Al- Mansour University College, Iraq   
#

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc

Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna 

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc

Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna 

DoS and DDoS Attack Detection Using Deep Learning and IDS

Mohammad Shurman1, Rami Khrais2, and Abdulrahman Yateem1 1Jordan University of Science and Technology, Network Engineering and Security Department, Jordan 2Jordan University of Science and Technology, Computer Engineering Department, Jordan

An Anonymous Identity-based With Bilateral Protocol for Smart Grid

Jennifer Batamuliza1 and Damien Hanyurwimfura2 1College of Business and Economics, University of Rwanda, Rwanda 2College of Science and Technology, University of Rwanda, Rwanda