OALib Journal
  OALib Journal is an all-in-one open access journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721). It accepts a manuscript for the peer-review processing, typesetting, publication and then allocated to one of the 322 subject areas. The article processing charge for publishing in OALib journal is Only $99. For more details, please contact service@oalib.com. Submit now
               Articles    |    Aims & Scope    |    Instructions for Author     |    Editorial Board     |    Publishing Price    |    Indexing             


Jul 30, 2020Open    AccessArticle

An Enhanced Web Base Certificate Verification System

Izuchukwu Chijioke Emele, Stanley Ikechukwu Oguoma, Kanayo Kizito Uka, Emeka Christian Nwaoha
The objective of this work is to design and implement an enhanced wed-based certificate verification system that will assist schools and co-operate organizations to confirm the originality of students’ certificate by displaying certificate details, and format with owner’s image. This work was motivated by the level of certificate forgery, time wastage and the stress encountered while processing this manually. The system adopted the object oriented and design methodology (OOADM) while the program...
Open Access Library J. Vol.7, 2020

Apr 12, 2018Open    AccessArticle

Analysis and Reflection on the Utilization of Foreign Academic E-Book—An Empirical Study Based on 367 Users of a University

Jiayin Liu, Chen Chen
Based on the form of questionnaire, this paper explores the use of foreign academic e-books by teachers and students in a certain school from a subjective view. 367 Users’ behavior, habits and needs were analyzed. Based on the results of the analysis, four suggestions are put forward to improve the overall utilization: Promote the localization of interface, pay attention to users’ advice while
Open Access Library J. Vol.5, 2018

Mar 19, 2018Open    AccessArticle

Securisation of an IPv6 Address Obtaining with SLAAC in Home Networks

S. Y. Massamba, S. A. R. R. Cheikh
In this article, we present a new method based on the securisation of an IPv6 (Internet Protocol version 6) address obtaining with the SLAAC (Stateless Address Autoconfiguration) method in the domestic network. The particularity of our domestic network is the presence of several Multihoming Internet service providers. The peripherals of the Home Network domain, especially routers are in charge of the re
Open Access Library J. Vol.5, 2018

Oct 11, 2016Open    AccessArticle

Tightly-Secure Authenticated Key Exchange without NAXOS’ Approach Based on Decision Linear Problem

Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
Design Secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem. NAXOS approach [4] is used to hide the ephemeral secret key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approach will cause two main drawbacks: (i) leaking of the static secret key which will be utilized in computing the exponent of the ephemeral public key; (ii) ma
Open Access Library J. Vol.3, 2016

Apr 28, 2016Open    AccessArticle

Data Security of Mobile Cloud Computing on Cloud Server

Mohammad Waseem, Abdullah Lakhan, Irfan Ali Jamali
Mobile Cloud computing is a technology of delivering services, such as software, hardware (virtual as well) and bandwidth over the Internet. Mobile devices are enabled in order to explore, especially Smart phones. The mobile cloud computing technology is growing rapidly among the customers and many companies such as Apple, Google, Facebook and Amazon with rich users. Users can access their data at any time, at any place, even with any device including mobile devices by using the cloud storage se...
Open Access Library J. Vol.3, 2016

Nov 25, 2015Open    AccessArticle

The Content Security Mechanism of Smart TV Broadcasting Operating System

Xin Wang
Smart TV broadcasting system is an extensively deployed application which charges users based on their subscription. In Smart TV broadcasting service environments, services providers charge subscription fee by scrambling the programs in CAS. This technique abstain unauthorized televiewers to watch and receive the program. Smart TV malware presents significant threat to Homeland Security. Security for contents running on smart TV terminals is important. As a new smart TV operating system, SMART T...
Open Access Library J. Vol.2, 2015

Oct 22, 2014Open    AccessArticle

Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)

Amin Mohajer, Mohammad Hasan Hajimobini, Abbas Mirzaei, Ehsan Noori
Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. There are several architectures for embedding IDS in WSN. Due to Energy Limitation, in this paper we use a distributed architecture which activates intrusion detection system for limited number of nodes. For this purpose we select a secure set of nodes c...
Open Access Library J. Vol.1, 2014

Oct 21, 2014Open    AccessArticle

Development of College of Industrial Technology Frequency Modulation Broadcast Trainer

Bernardo A. Pangilinan
A frequency modulation broadcast station trainer was developed to expose the students to the basic equipment needed in radio broadcasting. The cost of portable FM broadcast trainer is much lower than the cost of the traditional commercially available equipment because of the materials used. The FM broadcast trainer is laboratory equipment that can be used by schools offering academic programs in industrial courses specifically Electronics and Communication Technology courses. At present there is...
Open Access Library J. Vol.1, 2014


Contact Us



微信:OALib Journal