Journal cover image

Browse issues


Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Internet Technology and Secured Transactions

2011 Vol. 3 No. 2

 

PagesTitle and authors
111-120Analogue to digital converter design for software defined radio – an optimised approach
K.V. Shriram, K. Venkateshwaran, V. Subashri, V. Vaithiyanathan
DOI: 10.1504/IJITST.2011.039772

121-133Trust enhancement of P2PSIP communication systems
Xianghan Zheng, Vladimir Oleshchuk
DOI: 10.1504/IJITST.2011.039773

134-148Enhanced semantic expansion for question classification
Ali Harb, Michel Beigbeder, Kristine Lund, Jean-Jacques Girardot
DOI: 10.1504/IJITST.2011.039774

149-160Role inheritance with object-based DSD
Muhammad Asif Habib
DOI: 10.1504/IJITST.2011.039775

161-177CiteRank: combination similarity and static ranking with research paper searching
Pijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana
DOI: 10.1504/IJITST.2011.039776

178-193Optimising password security through key-pattern analysis
Ravel Jabbour, Wes Masri, Ali El-Hajj
DOI: 10.1504/IJITST.2011.039777

194-209Online social network profile data extraction for vulnerability analysis
Sophia Alim, Ruqayya Abdulrahman, Daniel Neagu, Mick Ridley
DOI: 10.1504/IJITST.2011.039778

210-222A novel steganographic methodology for high capacity data hiding in executable files
Rajesh Kumar Tiwari, G. Sahoo
DOI: 10.1504/IJITST.2011.039779