DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW
Author(s): Narender Singh | Kuldeep Vats | Jasvinder | Lovish Jaiswal

An Effective Technique For Data Security in Modern Cryptosystem
Author(s): Dilbag Singh | Ajit Singh

A Comparative Study of Software Requirements Tools For Secure Software Development
Author(s): Mohammad Ubaidullah Bokhari | Shams Tabrez Siddiqui

A Secure Private Key Encryption Technique For Data Security in Modern Cryptosystem
Author(s): Dilbag Singh

Tourist Attitudes toward Traveling in Thailand after the Political Demonstrations and Protests
Author(s): Rawewan Maliwan | Bahaudin G. Mujtaba

Study of the Effects of Noise & Future Time Stamps on a New Model Based Encryption Mechanism
Author(s): A. V. N. Krishna | P. V. Sarat Chand

Applications of Public Key Watermarking for Authentication of Job-Card in MGNREGA
Author(s): Sirsendu Sarbavidya | Sunil Karforma

Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages
Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari

Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi

Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Based on Network Size for MANET
Author(s): Dr. Ritika | Dr. Nipur

Semantic Massage Addressing based on Social Cloud Actor's Interests
Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil

Algorithem and Programme for Computation of Forces Acting on Line Supports
Author(s): Abdulaziz Salem Bahaidara

A Micro-Mobility Management Scheme for Handover and Roaming
Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra

Audio Steganography Coding Using the Discrete Wavelet Transforms
Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani

A LOCATION TRACER WITH SOCIAL NETWORKING SERVICES
Author(s): PRIYA A. KOTWAL | KAPIL JULWANI | SUNIL L. BANGARE | PALLAVI S. BANGARE

New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)
Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh

UNAPPROVED ACCESS POINT ELIMINATION IN WLAN USING MULTIPLE AGENTS AND SKEW INTERVALS
Author(s): Prof.S.B.Vanjale | J.A.Dave | Prof.P.B.Mane

Quality and Distortion Evaluation of Audio Signal by Spectrum
Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma

New Geo-Political Perspectives in Eastern Asia, Two Decades After the Fall of the USSR
Author(s): Attila Iakob | Raluca-Maria Nicoară

Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP
Author(s): Dattatherya | S. Venkata Chalam | Manoj Kumar Singh

The perception of Sao Paulo state consumers in relation to ship meat: analysis by principal components Percepção de consumidores paulistas em relação à carne ovina: análise fatorial por componentes principais
Author(s): Ricardo Firetti | Celso da Costa Carrer | Vivian Lara Silva | Marco Antônio Trindade | Silvio César de Souza | Holmer Savastano Júnior | Marcelo Machado de Luca de Oliveira Ribeiro

HWSW IMPLEMENTATION OF IRIS RECOGNITION ALGORITHM IN THE FPGA
Author(s): Hentati Raida | YassineAoudni | Mohamed Abid

TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT
Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar

The Failure Of Collective Security In The Post World Wars I And II International System
Author(s): Joseph C. Ebegbulem

IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL
Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana

Chemical cautery of the inferior turbinates with trichloroacetic acid
Author(s): Azevedo, Alexandre Fernandes de | Martins, Dário Antunes | Cardoso, Caroline Guimarães | Moraes, Itamar Fernando Cândido de | Michel, Luciane Maria Pereira | Leite, Laura Hora Rios

Volcanic SO2 and SiF4 visualization using 2-D thermal emission spectroscopy – Part 1: Slant-columns and their ratios
Author(s): W. Stremme | A. Krueger | R. Harig | M. Grutter

Development and Progress through Intellectual Property Protection and Leverage
Author(s): Gabriel I. NĂSTASE

Web 2.0 Technologies and Social Networking Security Fears in Enterprises
Author(s): Fernando Almeida

Dual Objective Security Driven Scheduling Model for Computational Grid using GA
Author(s): R. Kashyap | D.P. Vidyarthi

A Wireless Sensor Network Solution for Precision Agriculture Based on Zigbee Technology
Author(s): Amene Deljoo | Manijeh Keshtgari

Secure Cooperative Spectrum Sensing based on the Distance between Bodies of Evidence
Author(s): Xiwen Tang | Yingguan Wang | Yi Wang | Yanjun Hu

Computation of Complex Primes Using Elliptic Curves: Application for Cryptosystem Design
Author(s): Boris S. Verkhovsky

Security Policy Management Process within Six Sigma Framework
Author(s): Erdal Oruklu | Jafar Saniie | Vijay Anand

Evaluation of Electrocardiogram for Biometric Authentication
Author(s): S K Singh | Yogendra Narain Singh

The Spirituality Questionnaire: Core Dimensions of Spirituality
Author(s): Gerhild Becker | Malgorzata Dragan | Carola Xander | Jochen Hardt | Sonja Schultz

Cyber-Physical-Social Based Security Architecture for Future Internet of Things
Author(s): Hong Liu | Huansheng Ning

An Architecture for “Web of Things” Using SOCKS Protocol Based IPv6/IPv4 Gatewaying for Heterogeneous Communication
Author(s): Raj B. Kulkarni | P. Shrinivasan R. Patnaikuni

Grounding Locations Assessment of Practical Power System
Author(s): Kousay Abdul Sattar | Ahmed M. A. Haidar | Nadheer A. Shalash

Forest Biomass Availability Analysis and Large-Scale Supply Options
Author(s): Eero Jäppinen | Kalle Karttunen | Tapio Ranta | Olli-Jussi Korpinen

Safety Aspects in the Distance Learning Systems
Author(s): Alexander Zyma | Yousef Daradkeh | Sergii Kavun

Feeding studies of radiation sterilization ready to eat foods on sprague dawley rats: In vivo
Author(s): Yulvian Sani | Zubaidah Irawati

Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks
Author(s): Tae Ho Cho | Soo Young Moon

A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
Author(s): Abdulrahman H. Altalhi

Research on User Permission Isolation for Multi-Users Service-Oriented Program
Author(s): Liang Peng | Yingxu Lai | Shupo Bu | Zhan Jing | Li Yu | Jiang Wei | Lin Li

Supply and Demand of a Forest Biomass in Application to the Region of South-East Finland
Author(s): Tapio Ranta | Mika Laihanen | Antti Karhunen

Safety Aspects in the Distance Learning Systems
Author(s): Alexander Zyma | Yousef Daradkeh | Sergii Kavun

Feeding studies of radiation sterilization ready to eat foods on sprague dawley rats: In vivo
Author(s): Yulvian Sani | Zubaidah Irawati

Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks
Author(s): Tae Ho Cho | Soo Young Moon

A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
Author(s): Abdulrahman H. Altalhi

Research on User Permission Isolation for Multi-Users Service-Oriented Program
Author(s): Liang Peng | Yingxu Lai | Shupo Bu | Zhan Jing | Li Yu | Jiang Wei | Lin Li

Supply and Demand of a Forest Biomass in Application to the Region of South-East Finland
Author(s): Tapio Ranta | Mika Laihanen | Antti Karhunen

Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics
Author(s): V.K. NARENDIRA KUMAR | B. SRINIVASAN | P.NARENDRAN

Building Consumers'Trust Based on Pick-up Goods Behavior in the Convenience Stores in Taiwan
Author(s): Chun-Chia Wang

Socio-Economic Characteristics of HIV in a South African Prison
Author(s): Jeff Gow | Bligh Grant | Mark Colvin

Introducing Modern Energy Services into Developing Countries: The Role of Local Community Socio-Economic Structures
Author(s): Willington Ortiz | Carmen Dienst | Julia Terrapon-Pfaff

Safety conditions of steam boilers in companies associated with a professional risk administration company in Antioquia, 2009
Author(s): Diego L. Sepúlveda M | Jairo Ramírez G

Perceived access to mental health services in three municipalities of Antioquia, 2004-2006
Author(s): Silvia Henao H | Vilma Restrepo R | Andrés F. Alzate R | Carlos M. González P

Erasing Space from Places Brandscapes, Art and the (de)valorisation of the Olympic Space
Author(s): Andrea Pavoni

Damaging events along roads during bad weather periods: a case study in Calabria (Italy)
Author(s): O. Petrucci | A. A. Pasqua

Condiciones de trabajo y evaluación de los factores de riesgo presentes en la población rural
Author(s): Agustín Vega Torres | Luz Andrea Rodríguez Rojas | Leonardo Emiro Contreras Bravo

Desempeño de la calidad del servicio (QoS) sobre IPv6
Author(s): Octavio José Salcedo Parra | Danilo López | Ángela Patricia Ríos

A alta progressiva como meio de reinserção social do paciente do manicômio judiciário
Author(s): Caroline Velasquez Marafiga | Elizabete Rodrigues Coelho | Maycoln Leôni Martins Teodoro

"Qual é o meu lugar no mundo?" - reflexões sobre o papel da Psicanálise na atenção integral ao portador de transtorno mental em conflito com a Lei
Author(s): Denise da Rocha Tourinho

Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations
Author(s): Jesus Conesa-Muñoz | Angela Ribeiro

Segment Based Visual Cryptography For Key Distribution
Author(s): Sesha Pallavi Indrakanti | Avadhani P S

Energy Efficient PKI Secure Key Management Technique in Wireless Sensor Network Using DHA & ECC
Author(s): Mohd. Rizwan beg | Shish Ahmad

Improved Performance by Parametrizing Wavelet Filters for Digital Image Watermarking
Author(s): Mangaiyarkarasi Palanivel | Arulselvi Shanmugam

A Hybrid Image Cryptosystem Based On OMFLIP Permutation Cipher
Author(s): G.Sudheer | B.V.S.Renuka Devi

Methodology for Human Face retrieval from video sequences based on holistic approach
Author(s): Z. G. Sheikh | V.M. Thakare | S. S. Sherekar

Practical Approach For Improving Security in Wireless Mesh Network Through ECC and Two Way Authentication Scheme
Author(s): Avinash P. Wadhe | N.A.Chavhan

Study of Mobile Botnets: An Analysis from the Perspective of Efficient Generalized Forensics Framework for Mobile Devices
Author(s): Rizwan Ahmed | Rajiv V. Dharaskar

Trust Model for Reliable File Exchange In Cloud Computing
Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque

A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve
Author(s): Daniyal M. Alghazzawi

Antiphishing Model with URL & Image based Webpage Matching
Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat

Mathematical Model for Digital Video Watermarking Based On 3D Wavelet Transform
Author(s): Sonam A. Bhandari | Amar D. Rana | Swati Z. Bhandari

Real time Video Streaming using Novel approach
Author(s): Mukesh Kumar | Jain Akash | B.A.Khivsara | Magar Padmakar | Baphana Abliasaha

Error Probability Analysis of Free-Space Optical Links with Different Channel Model under Turbulent Condition
Author(s): Bobby Barua | Tanzia Afrin Haque | Md. Rezwan Islam

Detection and elimination of covert communication in Transport and Internet layer A Survey
Author(s): D. M. Dakhane | Swapna Patil | Mahendra Patil

Artificial Intelligence with Stereo Vision Algorithms and its Methods
Author(s): Sahil S.Thakare | Rupesh P. Arbal | Makarand R. Shahade

Multimodal Biometric Feature based Person Classification
Author(s): Smita Thakre | Kalyani Mamulkar | Prachi Motghare | Pooja Godi | Ujwalla Gawande

A Novel Approach for Iris Encryption
Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni

Desing and Implementation of Distributed Security using Onion Routing
Author(s): Ashish T. Bhole | Savita H. Lambole

Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS
Author(s): Prasad Patil | Rinku Shah | Kajal Jewani

Antiphishing Model with URL & Image based Webpage Matching
Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat

Application of Data Mining Techniques to Palmprint Recognition
Author(s): Prachi Janrao | Vikas Singh

Data Integrity and Confidentiality in Outsourced Database
Author(s): Sonal Balpande | Rajashree Shegde | Lata Ragha

New Improved Methodology for Pedestrian Detection in Advanced Driver Assistance System
Author(s): Vijay Gaikwad | Shashikant Lokhande | Sanket Manthan

A Survey and Comparative Study of Vehicular Traffic Control System (VTCS)
Author(s): V. B. Vaghela | D. J. Shah

Secured and Authenticated Sharing of Software Program
Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati

Security Enhancement Algorithms for Data Transmission for Next Generation Networks
Author(s): Vikas Kaul | S K Narayankhedkar | S Achrekar | S Agarwal

La vivienda en la construcción de la independencia energética y alimentaria familiar. / The Family dwelling in the construction of food and energy independence.
Author(s): Felipe Albino Gervacio | Jorge Alejandro Alcérreca Huerta

Social protection and the citizen rights in Latin America: a narrative revision
Author(s): Álvaro Franco G | Luz M. Mejía O

Undergraduate Program in Network Engineering and Security – A Feasibility Study
Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani

An Approach for Secure Data Transmission in Private Cloud
Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani

A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data
Author(s): Srinivas M N | Srinivas B V | Marx R

Hardware Implementation of Mix Column Step in AES
Author(s): Pratap Kumar Dakua | Manoranjan Pradhan | Subba Rao Polamuri

An Approach for SMS Security using Authentication Functions
Author(s): Neetesh Saxena | Narendra S. Chaudhari

A New Security Protocol for Mobile Ad Hoc Networks
Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha

Analyzing Digital Signature Robustness with Message Digest Algorithms
Author(s): Rubina B. Patel | Naveen Chaudhary

Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach
Author(s): Kshitij Pathak | Narendra S. Chaudhari | Aruna Tiwari

Realization & Implementation of Wireless Parking System with GSM Based Security
Author(s): Meenakshi Tripathi | M. S. Gaur | Vijay Laxmi

Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3
Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji

Performance Analysis of Energy Efficient Clustering Algorithms for Wireless Sensor Network
Author(s): Naveen Choudhary | Dharm Singh | Shilpa Pandey

A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems
Author(s): Reema Patel | Amit Thakkar | Amit Ganatra

A Study of Role Based Access Control policies and Constraints
Author(s): Miriyala Markandeyulu | Bussa V.R.R.Nagarjuna | Akula Ratna Babu | A.S.K.Ratnam

A Hybrid Model of Multimodal Biometrics System using Fingerprint and Face as Traits
Author(s): Sonam Shukla | Pradeep Mishra

Cloud Computing: Different Approach & Security Challenge
Author(s): Maneesha Sharma | Himani Bansal | Amit Kumar Sharma

THE ANALYSIS AND ESTIMATION OF EFFICIENCY OF AGROINDUSTRIAL FORMATIONS OF HOLDING TYPE OF THE BELGOROD REGION
Author(s): E. Shedy
