Issue Title
Vol 6, No 1: GJCT Symmetric versus Asymmetric Cryptographic Techniques and Security Issues under Various Applications Abstract  PDF
Blerina Çeliku, Rafail Prodani, Klajdi Qafzezi
Vol 3, No 2: GJCT Concern for e-Commerce Security Abstract  PDF
Adamu Abubakar Isah
Vol 2, No 2: GJCT A Novel SSHE Architecture for Cloud with MAC authentication Abstract  PDF
Jagjit Singh, Er. Gurjit Singh Bhathal
Vol 1, No 1: GJCT Various Security Threats in Wireless Sensor Networks and their Defense Schemes Abstract  PDF
Malhar Bhandari
Vol 4, No 1: GJCT Measures of VPN Technology Abstract  PDF
Anurag Gupta
Vol 1, No 2: GJCT Threats and Security Aspects of IPv6 Abstract  PDF
Manish Shrivastava
1 - 6 of 6 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"