Refine your search

Your search returned 131 results.

Not what you expected? Check for suggestions
Algebrraic Cryptanalysis Of Feistel Structure Based Light Weight Block Ciphers Lt Cdr Nasir Mehmood PN

by Mehmood, Nasir ( MSIS-09).

Publisher: Rawalpindi MCS NUST 2014Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Internet cookies-threats to privacy, consequences and their remedial measures Junaid Mairaj

by Mairaj, Junaid (MSIS-2).

Publisher: Rawalpindi MCS (NUST) 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MAI (2).
Security Enhancements for privacy and key management protocol in IEEE 802.16e-2005 Ayesha Altaf

by Altaf, Ayesha (MSIS-5).

Publisher: Rawalpindi MCS (NUST) 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ALT (2).
Efficient implementation of spread spectrum based steganographic technique Muhammad Ashraf

by Ashraf, Muhammad ( MSIS-4).

Publisher: Rawalpindi MCS (NUST) March, 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ASH (2).
Augmented security in IEEE-802.22 mac layer protocol Rakhshanda Shaukat

by Shaukat, Rakhshanda ( MSIS-5).

Publisher: Rawalpindi MCS (NUST) 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SHA (2).
Analysis of voice over internet protocol (VoIP) and development of a generic technique to detect VoIP traffic (Hard / Soft-copy) Fauzia Idrees

by Idrees, Fauzia (MSIS-4).

Publisher: Rawalpindi MCS (NUST) April 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 IDR (2).
Performance comparison and evaluation of 802.011 A and its implementation in reconfigrable environment Saba Zia MSIS

by Zia, Saba MSIS.

Publisher: MCS July, 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ZIA (3).
Defining wireless network security policy for defense organization and integrating BLP model in the policy for access control (Hard / Soft-copy) Adnan Abbas

by Abbas, Adnan (MSIS-4).

Publisher: Rawalpindi MCS (NUST) April, 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.1 ABB (3).
Securing the GPRS network (Hard / Soft-copy) Imran Ishaq

by Imran Ishaq (MSIS-2).

Publisher: Rawalpindi MCS (NUST) January, 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ISH (2).
Analysis and enhancement of security framework of internet key exchange protocol for IPSEC- based networks Ghulam Safeer

by Safeer, Ghulam ( MSIS-3).

Publisher: Rawalpindi MCS NUST) July, 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SAF (2).
The design of a symmetric cryptographic system Muhammad Junaid Hussain

by Hussain, Muhammad Junaid (MSIS-1).

Publisher: Rawalpindi MCS (NUST) September, 2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 HUS (2).
Security of 802.11i based wireless local area networks Mansoor Ahmed Khan

by Khan, Mansoor Ahmed ( MSIS-5).

Publisher: Rawalpindi MCS (NUST) June, 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (2).
Development of software for encryption/decryption system based on symmetric cryptographic algorithm Adnan Mazhar Tipu

by Tipu, Adnan Mazhar ( MSIS-1).

Publisher: Rawalpindi MCS (NUST) Feb, 2005Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 TIP (1).
Developing SCA compliant security component and converting existing communication system into SCA-compliant SDR using OSSIE Muhammad Usman Shahid Khan

by Khan, Muhammad Usman Shahid ( MSIS-4).

Publisher: Rawalpindi MCS (NUST) 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KHA (2).
Performance enhancement of signature -based network intrusion detection system Muhammad Tariq Saeed

by Saeed, Muhammad Tariq (MSIS-4).

Publisher: Rawalpindi MCS (NUST) 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SAE (2).
Performance and security analysis of IEEE 802.1X authentication methods Muzammil Ahmed Khan

by Khan, Muzammil Ahmed ( MSIS-3).

Publisher: Rawalpindi MCS (NUST) 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KHA (2).
Analysis of skype security features to facilitate its detection, classification and blocking Uzma Aslam Khan

by Khan, Uzma Aslam (MSIS-4).

Publisher: Rawalpindi MCS (NUST) 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KHA (2).
Analyzing the effectiveness of IEEE 802.11 wireless LAN standard's security mechanism Muhammad Umar Ilyas

by Ilyas, Muhammad Umar (MSIS-2).

Publisher: Rawalpindi MCS (NUST) 2006Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 UMA (1).
Techniques of physical side channel crypt analysis Atiqur Rehman

by Rehman, Atiqur ( MSIS-2).

Publisher: Rawalpindi MCS (NUST) 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 REH (2).
A secure end -to- end public key architecture for wireless sensor networks Ayesha Naureen

by Naureen, Ayesha ( MSIS-4).

Publisher: Rawalpindi MCS (NUST) February, 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 NAU (2).
A secure cluster based hybrid key man management architecture for wireless sensor networks Attiya Akram

by Akram, Attiya (MSIS-4).

Publisher: Rawalpindi MCS (NUST) February, 2008Availability: Items available for loan: (3).
User web activity monitoring Muhammad Kamran Ahmed

by Ahmed, Muhammad Kamran (MSIS-6).

Publisher: Rawalpindi MCS (NUST) Dec 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (3).
A lightweight rabbit based security architecture for wireless sensor networks Ruhma Tahir

by Tahir, Ruhma (MSIS-5).

Publisher: Rawalpindi MCS NUST) May, 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 TAH (2).
Resolving the authentication-connection association problem in port knocking and single packet authorization based dynamic firewalls (Hard / Soft-copy) Muhammad Tariq

by Tariq, Muhammad (MSIS-4).

Publisher: Rawalpindi MCS (NUST) September, 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 TAR (2).
Mobile adhoc networks- a secure and efficient key management scheme Syed Azhar Mahmood

by Mahmood, Syed Azhar ( MSIS-4).

Publisher: Rawalpindi MCS (NUST) February, 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MAH (2).
Enhancement of security framework for mobile agent based intrusion detection system Lieut Commander Muhammad Aslam

by Aslam , Lieut Commander Muhammad ( MSIS-4).

Publisher: Rawalpindi MCS (NUST) April, 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ASL (4).
Protecting network services by large-scale simulation of hybrid-interaction decoys Syed Yasir Masood

by Masood, Syed Yasir ( MSIS-4).

Publisher: Rawalpindi MCS (NUST) December, 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MAS (2).
An extended visual secret sharing scheme for authentication Rabia Sirhindi

by Sirhindi, Rabia (MSIS-5).

Publisher: Rawalpindi MCS (NUST) November, 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SIR (2).
Design and analysis of non- linear random sequence generator Masaud Ahmed

by Ahmad, Masaud ( MSIS-1).

Publisher: Rawalpindi MCS (NUST) Sep, 2005Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (2).
Addressing security concerns of data exchange in AODV protocol Monis Akhlaq

by Akhlaq, Monis (MSIS-3).

Publisher: Rawalpindi MCS (NUST) November, 2006Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AKH (2).
Authentication in multi hop wireless mesh networks Kaleemullah Khan

by Khan, Kaleemullah (MSIS-2).

Publisher: Rawalpindi MCS (NUST) Jan, 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KHA (2).
Evaluation of different symmetric key cryptographic algorithms and design a new data encryption algorithm Syed Tahir Hussain Shah

by Shah, Syed Tahir Hussain (MSIS-2).

Publisher: Rawalpindi MCS (NUST) February, 2006Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 TAH (2).
Analyzing ieee 802.11 wireless lan for identity vulnerabilities and finding soluation to dos attacks based on these vulnerabilities Baber Aslam

by Baber ,Aslam (MSIS-3).

Publisher: Rwp MCS (NUST) Decomber,2006Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ASL (2).
Security analysis of ultra-lightweight cryptographic protocol: Gossamer protocol Zeeshan Bilal

by Bilal, Zeeshan ( MSIS-6).

Publisher: Rawalpindi MCS (NUST) January 2010Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 BIL (3).
A technique to discourage the relay attack on captcha Samin Jan Khan

by Khan, Samin Jan (MSIS-5).

Publisher: Rawalpindi MCS(NUST) February, 2010Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KHA (3).
Design and analysis of an attack resistant authentication protocol Sajjad Amin

by Amin, Sajjad (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AMI (2).
Taxonomy of cryptanalysis in Pakistan based on the experience of allied cryptanalysis efforts during world war-II Zaka Ur Rehman

by Rehman, Zaka Ur (Cryptology-1).

Publisher: MCS, May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 REH (2).
Performance analysis of ipsec in wired and wireless networks Anwer Ali

by Ali, Anwer (MSIS-2).

Publisher: Rawalpindi MCS (NUST) April, 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ALI (2).
Designing of a software tool for cryptographic analysis of speech compression algorithm celp Jamil Ahmad Zia

by Zia, Jamil Ahmad (MSIS-2).

Publisher: Rawalpindi MCS (NUST) Oct, 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (2).
High volume secure data hiding in video Asad Amir Pirzada

by Pirzada, Asad Amir ( MSIS-1).

Publisher: Rawalpindi MCS (NUST) January, 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AMI (2).
Development of key management system for the IPSEC protocols Ajmal Saeed Mian

by Mian, Saeed Ajmal (MSIS-1).

Publisher: Rawalpindi MCS (NUST) January ,2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MIA (3).
Information theoretic analysis of data represented in roman Urdu against normal English Arshad Ali

by Ali, Arshad (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ALI (2).
Design and analysis of symmetric cryptographic algorithm based on 256-bit key or greater for computer communications Talha Muhammad

by Muhammad,Talha (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MUH (2).
Reducing the overhead cost for different mobility models in Ad hoc on demand distance vector (AODV) protocol Babar Sarwar Kawish

by Kawish, Babar Sarwar ( MSIS-3).

Publisher: Rawalpindi MCS (NUST) Oct, 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KAW (1).
Context and role based access control model of an educational system Muhammad Luqman Dar

by Dar, Muhammad Luqman (MSIS-2).

Publisher: Rawalpindi MCS (NUST) Feb. 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 DAR (2).
Analysis and simulation of DOS attack detection using dependency and correlation Muhammad Abu Baker Ilyas

by Ilyas, Muhammad Abu Baker (MSIS-1).

Publisher: Rawalpindi MCS (NUST) April 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ILY (2).
Factoring RSA public key (integers) and the effect of using different polynomial selection methods on general number field sieve (GNFS) algorithm Waqas Ahmed

by Ahmed, Waqas (MSIS-4).

Publisher: Rawalpindi MCS (NUST) October, 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (1).
Algebraic attack on A5-type irregularly clocked key stream generator Mehreen Afzal MSCS-2

by Afzal, Mehreen MSCS-2.

Publisher: MCS May, 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AFZ (2).
Factoring rse public key (integers) and the effect of using different polynomial selection methods on general number field sieve (GNFS) algorithm Waqas ahmed

by Ahmed, Waqas (MSIS-4).

Publisher: Rawalpindi MCS,NUST October,2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (1).
Study and implementation of IP encapsulating security payload (ESP) in tunnel mode Majid Ameen

by Ameen, Majid ( MSIS-02).

Publisher: Rawalpindi MCS (NUST) 2004Availability: Items available for loan: (2).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.