E-ISSN:2218-3450 / ISSN:1018-1393 / GPN: 2007800019
|
Current Issue
|
Journal Archive
Home
About MISR
Editorial Board
Call for Paper
Submission Guidelines
Paper Submission System
Reference format styles
Publication Ethics
Copyright Agreement
MISR Online Issues
Subscription
Publisher Website for MISR
Volume 19 Number 2
Full journal book: Vol. 19, No. 2
Table of Contents
Editor's Introduction
Eldon Y. Li, Shari S.C. Shang
Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm
Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi
Exploring Donation Appeals in Top Not-for-Profit Websites
Robert E. Pitts, Julia E. Blose, Rhonda W. Mack
Detection and Analysis of Security Vulnerabilities in Java
Ch. Aswani Kumar, M. Sai Charitha
Modelling e-Health Systems Security Requirements: A Business Process Based Approach
Ahmed H. Alahmadi, Ben Soh, Azmat Ullah
Link to Airiti Library
Tel:886-2-29393091 ext:89055 Fax:886-2-29393754
COPYRIGHT BY Department of Management Information Systems, National Chengchi University
In partnership with Airiti Publishers since 2009