Current Issue


Vol. 16 No 3 September 2025

Article
A Study of Cloud Computing Performance and Security using Full Harmonic Encryption Method

Farhan Nisar

https://doi.org/10.6025/jisr/2025/16/3/85-97

Abstract Cloud Computing mean the relationship between many computer users across through a get in touch relation with other users like internet. In Cloud Computing we transmit and receive data from the internet. Cloud Computing give the liberty... Read More


Article
Algorithms and Methods for Detection of Phishing Website: A Review

Arun Kumar R, Vaishnavi H, Anusha S, Nausheen K, Apeksha P

https://doi.org/10.6025/jisr/2025/16/3/98-109

Abstract Phishing websites pose a serious threat, prompting the use of machine learning for detection. Researchers employ algorithms like XGBoost, Gradient Boosting, Adaboost, SVM, and Random Forest, trained on datasets to discern patterns distinguishing phishing from legitimate sites.... Read More


Article
Only 3-way Handshake Pake based on Reversible Cellular Automata

Soufiane Baghor, Kamel Mohamed Faraoun

https://doi.org/10.6025/jisr/2025/16/3/110-124

Abstract In this paper, we propose an only three way handshake password authenticated key exchange using only the mechanism of two-dimensional reversible cellular automata. The scheme use simple and elementary operations to handle the problem of mutual authentication... Read More