Designing and Implementing a Distributed Social Network Service for Mobile Devices
Author(s): Alexandru RADOVICI | Valentin CRISTEA

Some New Constructions of Authentication Codes with Arbitration and Multi-Receiver from Singular Symplectic Geometry
Author(s): You Gao | Huafeng Yu

Robustness of Multi Biometric Authentication Systems against Spoofing
Author(s): Mahdi Hariri | Shahriar B. Shokouhi

DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB)
Author(s): EDWARD N. UDO | IMO J. EYO | INI J. UMOEKA

PHARMACOGNOSTIC STUDIES ON TRACHYSPERMUM AMMI LINN. A POWDER ANALYSIS
Author(s): Hardel Danendra kumar | Sahoo Laxmidhar | Patel Jitendra

Tripartite Key Agreement Protocol using Conjugacy Problem in Braid Groups
Author(s): Atul Chaturvedi | Varun Shukla

Secure Mechanism for DYMO Routing Protocol by using Elliptic Curve Cryptography in Mobil Adhoc Networks
Author(s): Rayala Upendar Rao | Daranasi Veeraiah

"Iris recognition using Partial Coefficients by applying Discrete Cosine Transform, Haar Wavelet and DCT Wavelet Transform"
Author(s): Dr. H. B. Kekre | Dr. Tanuja K. | Pratik Bhatia | Sandhya N. Nayak | Dheeraj Nagpal

Securing Bandwidth Request Messages in Wimax
Author(s): Kaushik Adhikary | Rajinder Kumar | Amit Kumar

A Block Cipher Using Graph Structures and Logical XOR Operation
Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar

Performance Analysis of Signaling Cost on EapTls Authentication Protocol Based on Cryptography
Author(s): R.Narmadha | Dr.S.Malarkan | Dr.C.Ramesh

Personal Authentication through Retinal Blood Vessels Intersection Points Matching
Author(s): Md. Amran Siddiqui | S. M. Hasan Sazzad Iqbal | Md. Rounok Salehin

A Framework for Constructing a New Model of Web Database Security
Author(s): Eslam MohsinHassib | Amany Mahmoud Sarhan | Ahmed Ibrahim Saleh

A Framework for the Integration of Biometric Into Nigerian Banking ATM System
Author(s): Emuoyibofarhe O.J | Fajuyigbe O. | Emuoyibofarhe O.N | Alamu F.O.

The Effective and Efficient Security Services For Cloud Computing
Author(s): Sambhaji Sarode | Deepali Giri | Khushbu Chopde

Intrusion Detection System for Ad hoc Mobile Networks
Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal

Authenticating and Securing EndToEnd Communications through Encrypted Key Model for Mobile Ad Hoc Network
Author(s): M. B. Mukesh Krishnan | Dr. P. Sheik Abdul Khader

The Application of R Software in the Calculation of Volatility
Author(s): Yujie CUI | Zheng WEN | Luyun CUI | Tian TIAN

Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields
Author(s): Ch. Suneetha | D. Sravana Kumar | A. Chandrasekhar | K. Vanitha

A Unique Approach for Watermarking Nonnumeric Relational Database
Author(s): Rajneesh Kaur Bedi | Purva Gujarathi | Poonam Gundecha | Ashish Kulkarni

ANALGESIC ACTIVITY OF ROOT EXTRACT OF SOLANUM MELONGENA LINN ROOT
Author(s): Srivastava Ashish | Sanjay Yadav

DEFENDING AGAINST ATTACKS BY ENHANCING SECURITY USING BIOMETRICS IN SEMANTIC WEB
Author(s): Akhilesh Dwivedi

BIOMETRIC: CASE STUDY
Author(s): Sushma Jaiswal | Dr. Sarita Singh Bhadauria | Dr.Rakesh Singh Jadon

Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain Neuro Image Coding
Author(s): T.Karthikeyan | B.Sabarigiri

Smart Card Security; Technology and Adoption
Author(s): Hamed Taherdoost | Shamsul Sahibuddin | Neda Jalaliyoon

BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI
Author(s): Josua Tarigan

PHARMACOGNOSTIC EVALUATION OF LEAVES OF ALANGIUM SALVIIFOLIUM LINN
Author(s): D. Saravanan | J. Padmavathy | M.J. Parimala | I. Aparna Lakshmi | Ch. Praveen

SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication
Author(s): Rushdi A. Hamamreh | Anas M. Melhem

CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS
Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR

A Robust Three-Way Authentication System using Modified Random Grid based Reversible Style Visual Cryptography
Author(s): B. Padhmavathi | P. Nirmal Kumar | M. A. Dorai Rangaswamy

Privacy Management in Cloud by making use of Homomorphic Functions
Author(s): S. G. Sutar | G. A. Patil

A Comprehensive Study of Palmprint based Authentication
Author(s): Madasu Hanmandlu | Neha Mittal | Ankit Gureja | Ritu Vijay

MAC based Approaches for Multicast Source Authentication
Author(s): Ramanpreet Kaur | Amrit Lal Sangal | Krishan Kumar

MySQL and MATLAB Interfacing for Biometric Template Protection with Encryption
Author(s): M.Mani Roja | Dr.Sudhir Sawarkar

Design of Digital Signature Algorithm by Fractals and Chaos Theory
Author(s): Dr. G. Geetha | K. Thamizhchelvy

An enhanced Scheme for Reducing Vertical handover latency
Author(s): Mohammad Faisal | Muhammad Nawaz Khan

Aplicaciones y seguridad en la implementación de competencias prácticas en entornos de gestión del aprendizaje
Author(s): Gil, R. | San Cristóbal, E. | Tawfik, M. | Martín, S. | Pesquera, A. | Díaz, G. | Colmenar, A. | Carpio, J. | Peire, J. | Castro, M.

Personal Authentication System using Hand Vein Biometric
Author(s): G. Sathish | Dr. S.V. Saravanan | Dr. S. Narmadha | Dr. S. Uma Maheswari

Diameter-based Protocol in the IP Multimedia Subsystem
Author(s): Vinay Kumar.S.B | Manjula N Harihar

Rank-Level Fusion of Multispectral Palmprints
Author(s): Neha Mittal | Madasu Hanmandlu | Jyotsana Grover | Ritu Vijay

Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD).
Author(s): B. Srinivas | Dr.Koduganti Venkata Rao | Dr. P.Suresh Varma

Reference Architecture for Personalized E-learning Systems using Proxy and Caching (RAPESPAC)
Author(s): K. Palanivel | S. Kuppuswami

E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
Author(s): Pardeep Kumar | Sang-Gon Lee | Hoon-Jae Lee

Cryptanalysis and Enhancement of Two Low Cost RFID Authentication Protocols
Author(s): Hoda Jannati | Abolfazl Falahati

An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking
Author(s): M.Sreedevi | R. Seshadri

Encryption Of Data Using Elliptic Curve Over Finite Fields
Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR

Performance Evaluation of Wi-Fi comparison with WiMAX Networks
Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao

ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks
Author(s): G.Padmavathi | P.Subashini | D.Devi Aruna

A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
Author(s): Minal Moharir | A V Suresh

FORMULATION AND EVALUATION OF COMPOUND AYURVEDIC FORMULATION KRISHNADI CHURNA
Author(s): Saurabh Sharma | Satish Nayak | Sushil Mhaske

ATTACK VECTORS USED IN FRAUDULENCE CONNECTION DURING ONLINE TRANSACTIONS
Author(s): PRADEEP PUNDIR AND VIRENDRA GOMANSE

PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME
Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa

PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME
Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa

COMPARISON OF SVD BASED IMAGE WATERMARKING TECHNIQUES IMPLEMENTED FOR GRAY SCALE AND COLOR IMAGES
Author(s): VIJAYA KUMARI V. and CHITRA B.

EVALUATION OF SYZYGIUM CUMINI LINN. SEED FORMULATIONS AVAILABLE IN THE MARKET USING SPECTROPHOTOMETRIC AND CHROMATOGRAPHIC TECHNIQUES
Author(s): K. S. Chitnis et al.

Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net
Author(s): V.K. NARENDIRA KUMAR | B. SRINIVASAN

An Anonymous Authentication Scheme Based on Fully Homomorphic Encryption in P2P Networks
Author(s): Xiaoliang Wang | Yuling Liu | Hengfu Yang

Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model
Author(s): Gary Cantrell | David Dampier | Yoginder S. Dandass | Nan Niu | Chris Bogen

Applications of Public Key Watermarking for Authentication of Job-Card in MGNREGA
Author(s): Sirsendu Sarbavidya | Sunil Karforma

A Micro-Mobility Management Scheme for Handover and Roaming
Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra

Quality and Distortion Evaluation of Audio Signal by Spectrum
Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma

Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP
Author(s): Dattatherya | S. Venkata Chalam | Manoj Kumar Singh

A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment
Author(s): Rukshan Athauda | Geoff Skinner | Ilung Pranata

Evaluation of Electrocardiogram for Biometric Authentication
Author(s): S K Singh | Yogendra Narain Singh

SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET
Author(s): Lucas Chi Kwong Hui | Victor On Kwok Li | Siu Ming Yiu | Tat Wing Chim | Jeanno Chin Long Cheung

Feasibility Study on a Portable Field Pest Classification System Design Based on DSP and 3G Wireless Communication Technology
Author(s): Ruizhen Han | Yong He | Fei Liu

Energy Efficient PKI Secure Key Management Technique in Wireless Sensor Network Using DHA & ECC
Author(s): Mohd. Rizwan beg | Shish Ahmad

Practical Approach For Improving Security in Wireless Mesh Network Through ECC and Two Way Authentication Scheme
Author(s): Avinash P. Wadhe | N.A.Chavhan

Estimation of Resource Usage in Peer to Peer Network
Author(s): Amol P. Bhagat | Pravin Malve | Jayant Mehare

Authentication based Hop Count Clustering Algorithm in Mobile Adhoc Network
Author(s): Pranita M. Potey | Naveeta Kant

Face Recognition by Classification in Eigenspace
Author(s): Swati Choudhary | Mansi Shirwadkar | Hemlata Patil

Score Level Fusion of Face and Finger Traits in Multimodal Biometric Authentication System
Author(s): Utkarsh Gupta | Jasraj Fukane | Varshini Ramanan | Rohit Thakur

A Novel Approach for Iris Encryption
Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni

Desing and Implementation of Distributed Security using Onion Routing
Author(s): Ashish T. Bhole | Savita H. Lambole

Texture Feature Extraction using Partitioned/Sectorized Complex Planes in Transform Domain for Iris & Palmprint Recognition
Author(s): H B Kekre | V A Bharadi

Secured and Authenticated Sharing of Software Program
Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati

Desain dan Implementasi Web Proxy dan VPN Akses (Studi Kasus di Undip)
Author(s): Adian Fatchur Rochim | Andrian Satria Martiyanto

An Approach for SMS Security using Authentication Functions
Author(s): Neetesh Saxena | Narendra S. Chaudhari

A New Security Protocol for Mobile Ad Hoc Networks
Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha

Development of quality standard parameters of Ichnocarpus frutescens
Author(s): *Deepak Sharma1,Mohd. Mujeeb1,Aftab ahmad1,Abul Kalam1,Rati Tripathi Kailash Prasad2,Manisha Gupta3,Ram Chand Dhakar4

Development of quality standards of Caesalpinia crista leaves
Author(s): H. P. Suryawanshi1*, M. R. Patel2, J. K. Patil1, H. Sayyed1, R. A. Ahirrao1, D. M. Pokal2.

Achieving Identity-Based Cryptography in a Personal Digital Assistant Device
Author(s): L. Martínez-Ramos | L. López-García | F. Rodríguez-Henríquez

ISOLATION AND HPTLC ESTIMATION OF AESCULIN FROM OXYSTELMA ESCULENTUM
Author(s): Pandya Devang J. | Anand Indermeet S.

A Survey on Digital Video Watermarking
Author(s): Swati Patel | Anilkumar Katharotiya | Mahesh Goyani

A Genetic Based Non-Invertible Cryptographic Key Generation From Cancelable Biometric in MANET
Author(s): Manisha Mehta | Hiteishi Diwanji | Jagdish S Shah

ISOLATION AND HPTLC ESTIMATION OF KAEMPFEROL FROM OXYSTELMA ESCULENTUM
Author(s): Devang J. Pandya | Indermeet S. Anand

PHARMACOGNOSTICAL AND PHYSICOCHEMICAL EVALUATION OF PTEROSPERMUM SUBERIFOLIUM LINN LEAVES
Author(s): Vibhor K. Jain

Secure Authentication using Anti-Screenshot Virtual Keyboard
Author(s): Ankit Parekh | Ajinkya Pawar | Pratik Munot | Piyush Mantri

Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris
Author(s): Mr.P.Balakumar | Dr.R.Venkatesan

A Graphical Password Based System for Small Mobile Devices
Author(s): Wazir Zada Khan | Mohammed Y Aalsalem | Yang Xiang

An Efficient Secure Biometric System with Non-Invertible Gabor Transform
Author(s): N.Radha | Dr.S.Karthikeyan

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key
Author(s): Tanmay Bhattacharya | Sirshendu Hore | S. R. Bhadra Chaudhuri

Establishing Security for Group Communication in Multicast Environment
Author(s): B.V.S.S.R.S.Sastry | K.Akshitha | M.V.Vijaya Saradhi

A Novel Approach For Pass Word Authentication Using Bidirectional Associative Memory
Author(s): A S N Chakravarthy | Penmetsa V Krishna Raja | P S Avadhani

A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis
Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi

Securing Mobile Agents in MANET against Attacks using Trust
Author(s): Chandreyee Chowdhury | Sarmistha Neogy

Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.
Author(s): Alpesh R. Sankaliya | V.Mishra | Abhilash Mandloi

Role of Multiple Encryption in Secure Electronic Transaction
Author(s): Himanshu Gupta | Vinod Kumar Sharma

Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)
Author(s): Uttam Kr. Mondal | J.K.Mandal

A Secured Chat System With Authentication Technique As RSA Digital Signature
Author(s): Oyinloye O.Elohor | Ogemuno Emamuzo | Akinbohun Folake | Ayodeji .I. Fasiku

A Password-Based authentication and Key Agreement Protocol for Wireless LAN Based on Elliptic Curve and Digital Signature
Author(s): Saed Rezayi | Mona Sotoodeh | Hojjat Esmaili

A Method for Fingerprint Authentication for ATM Based Banking Application
Author(s): S. Koteswari | P. John Paul | V. Pradeep kumar | A.B.S.R. Manohar

Role Based Authentication Schemes to Support Multiple Realms for Security Automation
Author(s): Rajasekhar B. M | G. A. Ramachandra

Analysis of a Novel Hash Function Based upon Chaotic Nonlinear Map with Variable Parameter
Author(s): M. Nouri | S. Abazari Aghdam | P. Pourmahdi | M. Safarinia

Protecting the Content - Using Digest Authentication System and Other Techniques
Author(s): Raman Kumar | Naman Kumar | Neetika Vats

Intelligent Public Transport System with Information Forensics and Security
Author(s): Uma Nagaraj | Yogesh Pawar

Uniticket: A Third Party Universal E-Ticket System Based on Mobile Phone
Author(s): Linli Hu | Yuhao Wang | Dong Li

Extension of a port knocking client-server architecture with NTP synchronization
Author(s): Traian Andrei Popeea

Improving Malicious Clients Detection in BlobSeer using a Policy Enforcement Module
Author(s): Ana-Maria Lepar
