Journal: JCM

Volume 15, Issue 10

714 -- 721Khalid T. Mursi, Yu Zhuang. Experimental Study of Component-Differentially-Challenged XOR PUFs as Security Primitives for Internet-of-Things
722 -- 728Willian A. Dimitrov, Galina S. Panayotova. The Impacts of DNS Protocol Security Weaknesses
729 -- 734Tengfei Hu, Zhenni Pan, Megumi Saitou, Jiang Liu 0005, Shigeru Shimamoto. A Triple-Band Antenna Loaded with Reflector Surface for WLAN and 5G Applications
735 -- 740Mohammed M. Alani, Muath Alrammal, Munir Naveed. Implementing IoT Lottery on Data Encryption Standard
741 -- 746Michael O'Sullivan, Leonardo Aniello, Vladimiro Sassone. A Methodology to Select Topology Generators for Ad Hoc Mesh Network Simulations
747 -- 754Minh Nguyen Hieu 0001, Alexander Andreevich Moldovyan, Nikolay Andreevich Moldovyan, Canh Hoang Ngoc. A New Method for Designing Post-Quantum Signature Schemes
755 -- 767Matimu Caswell Nkuna, Ebenezer Esenogho, Reolyn Heymann. Integrating Smartphone Network Architecture and Data Security Techniques to Mitigate Sharp Practices in Non-Profit Organizations
768 -- 775Pushpender Sarao. Transmission Power Based Intelligent Model in VANET