BIOINFO Security Informatics
Editor-in-Chief : | ||||
Publisher : Bioinfo Publications | ||||
ISSN : 2249-9423 (Print) E-ISSN : 2249-9431 (Online) Frequency : Half Yearly | ||||
Index Copernicus Value (ICV) : 6.88 (2012); 4.28 (2011) CODEN : BSI | ||||
DOI : 10.9735/2249-9423 Abbreviation : Bioinfo Secur Inform | ||||
|
Most Viewed Articles
CYBERCRIMES, ATTACKS, VULNERABILITIES AND SECURITY
JOSHI R.N., DALVI R.M.,
Volume : 2 Issue : 2, Year : 2012 Views : 1100
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS COMPUTER NETWORK
WATANE H.N., GAWANDE A.D.,
Volume : 2 Issue : 1, Year : 2012 Views : 1071
HOMOMORPHIC AUTHENTICATION WITH RANDOM MASKING TECHNIQUE ENSURING PRIVACY & SECURITY IN CLOUD COMPUTING
JACHAK K.B., KORDE S.K., GHORPADE P.P., GAGARE G.J.,
Volume : 2 Issue : 2, Year : 2012 Views : 1042
PROCESSING A NEW BLIND SIGNATURE BASED ON ELGAMAL
DAMERI A., BOOSTANI R.,
Volume : 2 Issue : 2, Year : 2012 Views : 1029
A NEW WAY TO FIND OUT SUSPECTED NODE AS WELL AS REDUCE THE IMPACT OF GRAY HOLE ATTACK IN ADHOC NETWORK
LOKHANDE P.M., THAKARE A.P.,
Volume : 2 Issue : 2, Year : 2012 Views : 1028
WIRELESS MESH NETWORK SECURITIES
WANKHEDE P.G., CHAVHAN K.L.,
Volume : 2 Issue : 2, Year : 2012 Views : 1025
SECURITY IN CLOUD COMPUTING
GAWANDE Y.V., AGRAWAL L.S., BHARTIA A.S., RAPARTIWAR S.S.,
Volume : 2 Issue : 2, Year : 2012 Views : 1021
PROVIDING SECURITY CHALLENGES IN 4G SYSTEMS
SHIRBHATE D.D., KALE A.R.,
Volume : 2 Issue : 1, Year : 2012 Views : 1018
SECURITY AWARE ROUTING PROTOCOL FOR MANET USING ASYMMETRIC CRYPTOGRAPY USING RSA ALGORITHM
PRASAD LOKULWAR, VIVEK SHELKHE,
Volume : 2 Issue : 1, Year : 2012 Views : 1015
VANET SECURITIES AGAINST ATTACKS
CHAVHAN K.L., PATIL P.A.,
Volume : 2 Issue : 1, Year : 2012 Views : 1015
HAND GEUSTER RECOGNITION SYSTEM FOR MAN MACHINE INTERACTION AND SECURITY ENHANCEMENT USING FUZZY CLUSTERING
SHINDE J.P., JONDHALE S.D., SALUNKE D.J., ZINE D.B.,
Volume : 2 Issue : 1, Year : 2012 Views : 1012
NETWORK INTRUSION DETECTION SYSTEM & FUZZY LOGIC
THAKARE S.P., ALI M.S.,
Volume : 2 Issue : 1, Year : 2012 Views : 1002
DYNAMIC SECURITY SKINS-MUTUAL AUTHENTICATION
V.P. Surwase, Durugkar S.R.,
Volume : 1 Issue : 1, Year : 2011 Views : 1002
NETWORK SECURITY FRAMEWORK
ROKADE J.S., DESHMUKH H.R.,
Volume : 2 Issue : 2, Year : 2012 Views : 997
BIOMETRICS AUTHENTICATION TECHNIQUES IN ATM
Sandeep S. Majge, Hanmant W. Kulkarni,
Volume : 1 Issue : 1, Year : 2011 Views : 990
JOSHI R.N., DALVI R.M.,
Volume : 2 Issue : 2, Year : 2012 Views : 1100
WATANE H.N., GAWANDE A.D.,
Volume : 2 Issue : 1, Year : 2012 Views : 1071
JACHAK K.B., KORDE S.K., GHORPADE P.P., GAGARE G.J.,
Volume : 2 Issue : 2, Year : 2012 Views : 1042
DAMERI A., BOOSTANI R.,
Volume : 2 Issue : 2, Year : 2012 Views : 1029
LOKHANDE P.M., THAKARE A.P.,
Volume : 2 Issue : 2, Year : 2012 Views : 1028
WANKHEDE P.G., CHAVHAN K.L.,
Volume : 2 Issue : 2, Year : 2012 Views : 1025
GAWANDE Y.V., AGRAWAL L.S., BHARTIA A.S., RAPARTIWAR S.S.,
Volume : 2 Issue : 2, Year : 2012 Views : 1021
SHIRBHATE D.D., KALE A.R.,
Volume : 2 Issue : 1, Year : 2012 Views : 1018
PRASAD LOKULWAR, VIVEK SHELKHE,
Volume : 2 Issue : 1, Year : 2012 Views : 1015
CHAVHAN K.L., PATIL P.A.,
Volume : 2 Issue : 1, Year : 2012 Views : 1015
SHINDE J.P., JONDHALE S.D., SALUNKE D.J., ZINE D.B.,
Volume : 2 Issue : 1, Year : 2012 Views : 1012
THAKARE S.P., ALI M.S.,
Volume : 2 Issue : 1, Year : 2012 Views : 1002
V.P. Surwase, Durugkar S.R.,
Volume : 1 Issue : 1, Year : 2011 Views : 1002
ROKADE J.S., DESHMUKH H.R.,
Volume : 2 Issue : 2, Year : 2012 Views : 997
Sandeep S. Majge, Hanmant W. Kulkarni,
Volume : 1 Issue : 1, Year : 2011 Views : 990