Most Cited Articles - 2010

Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
Ulrich Herberg and Thomas Clausen, IJNSA Journal, Vol 2, No 2, April 2010 ,pp. 162-181
DOI: 10.5121/ijnsa.2010.2213

Analysis of the Security of BB84 By Model Checking
Mohamed Elboukhari, Mostafa Azizi and Abdelmalek Azizi,IJNSA Journal, Vol 2, No 2, April 2010,pp.87-98
DOI: 10.5121/ijnsa.2010.2207

Little Dragon Two: An Efficient Multivariate Public Key Cryptosystem
Rajesh P Singh, Anupam Saikia and B. K. Sarma, IJNSA Journal, Vol 2, No 2, April 2010,pp.01-10
DOI: 10.5121/ijnsa.2010.2201

Most Cited Articles - 2009

Cryptanalysis of a More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
Mohammed Aijaz Ahmed, D. Rajya Lakshmi and Sayed Abdul Sattar, IJNSA Journal, Vol 1, No 3, October 2009,pp.32-37

Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Alan Mink, Sheila Frankel and Ray Perlner,IJNSA Journal, Vol 1, No 2, July 2009,pp.101-112

On Generation of Firewall Log Status Reporter(SRr) Using Perl
Sugam Sharma, Hari Cohly and Tzusheng Pei, ,IJNSA Journal, Vol 1, No 2, July 2009,pp.90-99

A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm
Poonam Garg,IJNSA Journal, Vol.1, No 1, April 2009,pp.34-42

Using Rough Set and Support Vector Machine for Network Intrusion Detection
Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh,IJNSA Journal, Vol 1, No 1, April 2009,pp.01-13

Conferences & Workshops

Most Cited Articles

IJNSA is listed in ERA 2012 as per the Australian Research Council (ARC) Journal Ranking. New

Download leaflet