Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Network Security & Its Applications

ISSN: 0975--2307
Publisher: Academy & Industry Research Collaboration Center (AIRCC)


ADD TO MY LIST
 
Review on IPv6 Security Vulnerability Issues and Mitigation Methods PDF available

Author(s): Supriyanto | Raja Kumar Murugesan | Sureswaran Ramadass
Volume: 4
Issue: 6
Year: 2012
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography PDF available

Author(s): Arpita Sarkar | Sachin Tripathi
Volume: 4
Issue: 6
Year: 2012
Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique PDF available

Author(s): Oluwafemi Oriola | Adesesan B. Adeyemo | Oluwaseyitanfunmi Osunade
Volume: 4
Issue: 6
Year: 2012
A Novel Multipoint Relay based Secure Routing in MANET PDF available

Author(s): Himadri Nath Saha | Debika Bhattacharyya | P.K.Banerjee
Volume: 4
Issue: 6
Year: 2012
Secure Key Management Protocol in WIMAX PDF available

Author(s): Noudjoud Kahya | Nacira Ghoualmi | Pascal Lafourcade
Volume: 4
Issue: 6
Year: 2012
Wireless Public Key Infrastructure for Mobile Phones PDF available

Author(s): Balachandra Muniyal | Krishna Prakash | Shashank Sharma
Volume: 4
Issue: 6
Year: 2012
The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS PDF available

Author(s): John Tengviel | K. Diawuo | K. A. Dotche
Volume: 4
Issue: 6
Year: 2012
Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker PDF available

Author(s): Manu S. Hegde | Jnanamurthy HK | Sanjay Singh
Volume: 4
Issue: 6
Year: 2012
A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel PDF available

Author(s): Abudhahir Buhari | Zuriati Ahmad Zukarnain | Shamala K. Subramaniam | Hisham Zainuddin | Suhairi Saharudin
Volume: 4
Issue: 6
Year: 2012
Mining Techniques in Network Security to Enhance Intrusion Detection Systems PDF available

Author(s): Maher Salem | Ulrich Buehler
Volume: 4
Issue: 6
Year: 2012
Malware Detection, Supportive Software Agents and Its Classification Schemes PDF available

Author(s): Adebayo, Olawale Surajudeen | M.A. Mabayoje | Amit Mishra | Osho Oluwafemi
Volume: 4
Issue: 6
Year: 2012
Secured RFID Mutual Authentication Scheme for Mifare Systems PDF available

Author(s): Kuo-Tsang Huang | Jung-Hui Chiu
Volume: 4
Issue: 6
Year: 2012
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks PDF available

Author(s): Merad Boudia Omar Rafik | Feham Mohamed
Volume: 4
Issue: 6
Year: 2012
An Overview of Penetration Testing PDF available

Author(s): Aileen G. Bacudio | Xiaohong Yuan | Bei-Tseng Bill Chu | Monique Jones
Volume: 3
Issue: 6
Year: 2011
Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security PDF available

Author(s): William K. Moses Jr. | C. Pandu Rangan
Volume: 3
Issue: 6
Year: 2011
Statistical Quality Control Approaches to Network Intrusion Detection PDF available

Author(s): Rohitha Goonatilake | Rafic Bachnak | Susantha Herath
Volume: 3
Issue: 6
Year: 2011
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis PDF available

Author(s): Praveen Likhar | Ravi Shankar Yadav | Keshava Rao M
Volume: 3
Issue: 6
Year: 2011
Role of Multiple Encryption in Secure Electronic Transaction PDF available

Author(s): Himanshu Gupta | Vinod Kumar Sharma
Volume: 3
Issue: 6
Year: 2011
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems. PDF available

Author(s): Alpesh R. Sankaliya | V.Mishra | Abhilash Mandloi
Volume: 3
Issue: 6
Year: 2011
Enhancing Infrastructure Security in Real Estate PDF available

Author(s): Kyle Dees | Syed (Shawon) Rahman
Volume: 3
Issue: 6
Year: 2011
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks PDF available

Author(s): Novarun Deb | Manali Chakraborty | Nabendu Chaki
Volume: 3
Issue: 6
Year: 2011
Securing Mobile Agents in MANET against Attacks using Trust PDF available

Author(s): Chandreyee Chowdhury | Sarmistha Neogy
Volume: 3
Issue: 6
Year: 2011
An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS PDF available

Author(s): K.Kuppusamy | S.Malathi
Volume: 3
Issue: 6
Year: 2011
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm PDF available

Author(s): S.G.Srikantaswamy | H.D.Phaneendra
Volume: 3
Issue: 6
Year: 2011
Techniques and Tools for Forensic Investigation of E-mail PDF available

Author(s): M. Tariq Banday
Volume: 3
Issue: 6
Year: 2011
Experimenting with the Novel Approaches in Text Steganography PDF available

Author(s): Shraddha Dulera | Devesh Jinwala | Aroop Dasgupta
Volume: 3
Issue: 6
Year: 2011
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm PDF available

Author(s): Debasis Das | Rajiv Misra
Volume: 3
Issue: 6
Year: 2011
Efficient Detection of Sybil attack Based on Cryptography in Vanet PDF available

Author(s): Mina Rahbari | Mohammad Ali Jabreil Jamali
Volume: 3
Issue: 6
Year: 2011
Blind Signature Scheme Based on Chebyshev Polynomials PDF available

Author(s): Maheswara Rao Valluri
Volume: 3
Issue: 6
Year: 2011
Prediction of Malicious Objects in Computer Network and Defense PDF available

Author(s): Hemraj Sainia | T. C. Panda | Minaketan Panda
Volume: 3
Issue: 6
Year: 2011
User Authentication using Native Language Passwords PDF available

Author(s): Sreelatha Malempati | Shashi Mogalla
Volume: 3
Issue: 6
Year: 2011
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key PDF available

Author(s): P. Anuradha Kameswari | R. Chaya Kumari | L. Praveen Kumar
Volume: 3
Issue: 6
Year: 2011
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks PDF available

Author(s): Pinaki Sarkar | Amrita Saha | Samiran Bag
Volume: 3
Issue: 6
Year: 2011
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION PDF available

Author(s): Hani Qusa | Shadi Abudalfa
Volume: 5
Issue: 5
Year: 2013
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOMETRIC RECOGNITION SYSTEM PDF available

Author(s): Binsu C. Kovoor | Supriya M.H. | K. Poulose Jacob
Volume: 5
Issue: 5
Year: 2013
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING PDF available

Author(s): Huynh Nguyen Chinh | Tan Hanh | Nguyen Dinh Thuc
Volume: 5
Issue: 5
Year: 2013
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT) PDF available

Author(s): Madhumita Sengupta | J. K. Mandal,
Volume: 5
Issue: 5
Year: 2013
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (MREBC) PDF available

Author(s): Ahmed ElShafee
Volume: 5
Issue: 5
Year: 2013
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE PDF available

Author(s): Arijit Ukil | Debasish Jana | Ajanta De Sarkar
Volume: 5
Issue: 5
Year: 2013
KNOWLEDGE-BASED AUTHENTICATION USING TWITTER CAN WE USE LUNCH MENUS AS PASSWORDS? PDF available

Author(s): ManabuOkamoto
Volume: 5
Issue: 5
Year: 2013
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET PDF available

Author(s): J. K. Mandal | Khondekar Lutful Hassan
Volume: 5
Issue: 5
Year: 2013
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM PDF available

Author(s): Adnan M. Shihab | Raghad K. Mohammed | Woud M. Abed
Volume: 5
Issue: 5
Year: 2013
A NOVEL APPROACH FOR SECURE ROUTING THROUGH BGP USING SYMMETRIC KEY PDF available

Author(s): Divan Raimagia | Shraddha Singh | Sameena Zafar
Volume: 5
Issue: 5
Year: 2013
Z-SHAPED DIPOLE ANTENNA AND ITS FRACTAL ITERATIONS PDF available

Author(s): Mustafa H. Abu Nasr
Volume: 5
Issue: 5
Year: 2013
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CROWD IN A CLOUD COMPUTING ENVIRONMENT PDF available

Author(s): N.Jeyanthi | Hena Shabeeb | Mogankumar P.C
Volume: 5
Issue: 5
Year: 2013
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USING PSO PDF available

Author(s): K.Kuppusamy | K.Thamodaran
Volume: 5
Issue: 5
Year: 2013
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS PDF available

Author(s): Majid Alshammari | Christian Bach
Volume: 5
Issue: 5
Year: 2013
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET PDF available

Author(s): Ram Shringar Raw | Manish Kumar | Nanhay Singh
Volume: 5
Issue: 5
Year: 2013
Explore Ten Different Types of Software Engineering Principles PDF available

Author(s): S.Thulasee Krishna | S.Sreekanth | B. Bhaskar | N.Pavan Kumar
Volume: 4
Issue: 5
Year: 2012
Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM System with Implementation of Concatenated ECB and CFB Cryptographic Algorithm PDF available

Author(s): Laila Naznin | Shahrina Sultana | M. Golam Rashed | Shaikh Enayet Ullah
Volume: 4
Issue: 5
Year: 2012
Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer Network PDF available

Author(s): Prashant Kumar Singh | A. K. Vatsa | Reetu Sharma | Priyanka Tyagi
Volume: 4
Issue: 5
Year: 2012
A Simple and Reliable Touch Sensitive Security System PDF available

Author(s): Adamu Murtala Zungeru | Jonathan Gana Kolo | Ijarotimi Olumide
Volume: 4
Issue: 5
Year: 2012
A Survey on Web Spam Detection Methods: Taxonomy PDF available

Author(s): Shekoofeh Ghiam | Alireza Nemaney Pour
Volume: 4
Issue: 5
Year: 2012
Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network PDF available

Author(s): Amol Vasudeva | Manu Sood
Volume: 4
Issue: 5
Year: 2012
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications PDF available

Author(s): H.Jayasree | A.Damodaram
Volume: 4
Issue: 5
Year: 2012
Healthcare IT: Is Your Information At Risk? PDF available

Author(s): Kimmarie Donahue | Alireza Nemaney Pour
Volume: 4
Issue: 5
Year: 2012
Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and Acquisition of Companies PDF available

Author(s): Balachandra Muniyal | Mamatha Balachandra | Prema K.V
Volume: 4
Issue: 5
Year: 2012
Security V/S Qos for LTE Authentication and Key Agreement Protocol PDF available

Author(s): Jacques Bou Abdo | Jacques Demerjian | Hakima Chaouchi
Volume: 4
Issue: 5
Year: 2012
Design And Validation Of Specification Based Ids For Power Enhancement Related Vulnerabilities In AODV PDF available

Author(s): Chaitali Biswas Dutta | Utpal Biswas
Volume: 4
Issue: 5
Year: 2012
A Framework For Performance Evaluation Of ASIPs in Network-Based IDS PDF available

Author(s): Majid Nezakatolhoseini | Mohammad Amin Taherkhani
Volume: 4
Issue: 5
Year: 2012
Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts PDF available

Author(s): Priyanka Dey and Suparna Biswas
Volume: 4
Issue: 5
Year: 2012
Comparison of High Speed Congestion Control Protocols PDF available

Author(s): Jawhar Ben Abed | Laarif Sinda | Mohamed Ali Mani | Rachid Mbarek
Volume: 4
Issue: 5
Year: 2012
Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution PDF available

Author(s): Abudhahir Buhari | Zuriati Ahmad Zukarnain | Shamala K. Subramaniam | Hisham Zainuddin | Suhairi Saharudin
Volume: 4
Issue: 5
Year: 2012
SIMULATION OF THE COMBINED METHOD PDF available

Author(s): Ilya Levin | Victor Yakovlev
Volume: 3
Issue: 5
Year: 2011
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS Attack PDF available

Author(s): Vikram Singh | Vatika
Volume: 3
Issue: 5
Year: 2011
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION PDF available

Author(s): Shaik Rasool | G. Sridhar | K. Hemanth Kumar | P. Ravi Kumar
Volume: 3
Issue: 5
Year: 2011
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION PDF available

Author(s): Manabu Okamoto
Volume: 3
Issue: 5
Year: 2011
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES PDF available

Author(s): MARIA SCHUETT | CRISC | SYED (SHAWON)M. RAHMAN
Volume: 3
Issue: 5
Year: 2011
Botnet Command Detection using Virtual Honeynet PDF available

Author(s): J.S.Bhatia | R.K.Sehgal | Sanjeev Kumar
Volume: 3
Issue: 5
Year: 2011
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent PDF available

Author(s): Chintan Bhatt | Asha Koshti | Hemant Agrawal | Zakiya Malek | Bhushan Trivedi
Volume: 3
Issue: 5
Year: 2011
BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS PDF available

Author(s): Samira Mesmoudi | Mohammed Feham
Volume: 3
Issue: 5
Year: 2011
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS PDF available

Author(s): Hossein Jadidoleslamy
Volume: 3
Issue: 5
Year: 2011
HANDWRITTEN TEXT IMAGE AUTHENTICATION USING BACK PROPAGATION PDF available

Author(s): A S N Chakravarthy | Penmetsa V Krishna Raja | P S Avadhani
Volume: 3
Issue: 5
Year: 2011
METHOD FOR REDUCING OF NOISE BY IMPROVING SIGNAL-TO-NOISE-RATIO IN WIRELESS LAN PDF available

Author(s): R.Seshadri | N..Penchalaiah
Volume: 3
Issue: 5
Year: 2011
DDNFS: a Distributed Digital Notary File System PDF available

Author(s): Alexander Zangerl
Volume: 3
Issue: 5
Year: 2011
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK PDF available

Author(s): Dhara Buch | Devesh Jinwala
Volume: 3
Issue: 5
Year: 2011
Error Detection and Correction for Distributed Group Key Agreement Protocol PDF available

Author(s): P.Vijayakumar | S.Bose | A.Kannan
Volume: 3
Issue: 5
Year: 2011
ADAPTIVE ASSOCIATION RULE MINING BASED CROSS LAYER INTRUSION DETECTION SYSTEM FOR MANET PDF available

Author(s): V. Anjana Devi | R. S. Bhuvaneswaran
Volume: 3
Issue: 5
Year: 2011
Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism PDF available

Author(s): Preeti Sachan | Pabitra Mohan Khilar
Volume: 3
Issue: 5
Year: 2011
Trust Enhanced Data Security in Free Roaming Mobile agents Using Symmetric Key cryptography PDF available

Author(s): G.Geetha | C.Jayakumar
Volume: 3
Issue: 5
Year: 2011
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack PDF available

Author(s): L.Kavisankar | C.Chellappan
Volume: 3
Issue: 5
Year: 2011
Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level PDF available

Author(s): Fahmida Rahman | Mohammed Arozullah
Volume: 5
Issue: 4
Year: 2013
Non-Profit Organizations' Need to Address Security for Effective Government Contracting PDF available

Author(s): Lee E. Rice | Syed (Shawon) M. Rahman
Volume: 4
Issue: 4
Year: 2012
Evaluation of Security Attacks on UMTS Authentication Mechanism PDF available

Author(s): Mojtaba Ayoubi Mobarhan | Mostafa Ayoubi Mobarhan | Asadollah Shahbahrami
Volume: 4
Issue: 4
Year: 2012
Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP PDF available

Author(s): Abdullah AlOtaibi | Hamza Aldabbas
Volume: 4
Issue: 4
Year: 2012
Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining Replication and Diversity PDF available

Author(s): Charles A. Kamhoua | Patrick Hurley | Kevin A. Kwiat | Joon S. Park
Volume: 4
Issue: 4
Year: 2012
Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs with the Theory of Games PDF available

Author(s): Karim KONATE | Abdourahime GAYE
Volume: 4
Issue: 4
Year: 2012
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks PDF available

Author(s): Mahdi Aiash | Glenford Mapp | Aboubaker Lasebae
Volume: 4
Issue: 4
Year: 2012
Personal Safety Triggering System on Android Mobile Platform PDF available

Author(s): Ashokkumar Ramalingam | Prabhu Dorairaj | Saranya Ramamoorthy
Volume: 4
Issue: 4
Year: 2012
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks PDF available

Author(s): A. Forootaninia | M. B. Ghaznavi-Ghoushchi
Volume: 4
Issue: 4
Year: 2012
A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping Binary Exponential Backoff IEEE 802.15.4 PDF available

Author(s): Archit Verma Pushpinder Singh Patheja | Akhilesh Waoo
Volume: 4
Issue: 4
Year: 2012
Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System PDF available

Author(s): TALAL AL-KHAROBI | Mohmmed Abduallah Al-Mehdhar
Volume: 4
Issue: 4
Year: 2012
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security PDF available

Author(s): Manas Paul | Jyotsna Kumar Mandal
Volume: 4
Issue: 4
Year: 2012
How to Avoid the N-1 Attack Without Costly Implementations PDF available

Author(s): David Tinoco Varela
Volume: 4
Issue: 4
Year: 2012
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile PDF available

Author(s): S.Karthika | A.Kiruthiga | S.Bose
Volume: 4
Issue: 4
Year: 2012
A Novel Energy Efficient and Administrator Based Secured Routing in MANET PDF available

Author(s): Himadri Nath Saha | Debika Bhattacharyya | P. K.Banerjee
Volume: 4
Issue: 4
Year: 2012
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security PDF available

Author(s): S. Sree Vivek | S. Sharmila Deva Selvi | V. Radhakishan | C. Pandu Rangan
Volume: 2
Issue: 4
Year: 2012
Passblot: A Highly Scalable Graphical one Time Password System PDF available

Author(s): Sainath Gupta | Shashank Sahni | Pruthvi Sabbu | Suryakanth V Gangashetty
Volume: 2
Issue: 4
Year: 2012
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING PDF available

Author(s): S.S. Prasad | Rithika Baruah | Siddharth.A
Volume: 3
Issue: 4
Year: 2011
A Novel Header Matching Algorithm For Intrusion Detection Systems PDF available

Author(s): Mohammad A. Alia | Adnan A. Hnaif | Hayam K. Al-Anie | Khulood Abu Maria | Ahmed M. Manasrah | M. Imran Sarwar
Volume: 3
Issue: 4
Year: 2011
Security Apprehensions In Different Regions Of Cloud Captious Grounds PDF available

Author(s): Gurdev Singh | Amit Sharma | Manpreet Singh Lehal
Volume: 3
Issue: 4
Year: 2011
Cryptovirology: Virus Approach PDF available

Author(s): Shivale Saurabh Anandrao
Volume: 3
Issue: 4
Year: 2011
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM PDF available

Author(s): Nenad Stojanovski | Marjan Gušev
Volume: 3
Issue: 4
Year: 2011
Wavelet Thresholding Approach For Image Denoising PDF available

Author(s): Pankaj Hedaoo | Swati S Godbole
Volume: 3
Issue: 4
Year: 2011
Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network PDF available

Author(s): Hichem Sedjelmaci | Mohamed Feham
Volume: 3
Issue: 4
Year: 2011
An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of Encryption On Mac Layer PDF available

Author(s): Gulshan Kumar | Mritunjay Rai
Volume: 3
Issue: 4
Year: 2011
RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks PDF available

Author(s): R. Ramesh | S. Gayathri
Volume: 3
Issue: 4
Year: 2011
An Evaluation Of Fingerprint Security Using Noninvertible Biohash PDF available

Author(s): N.Radha | S.Karthikeyan
Volume: 3
Issue: 4
Year: 2011
Governing Information Security In Conjunction With Cobit And Iso 27001 PDF available

Author(s): Tolga Mataracioglu | Sevgi Ozkan
Volume: 3
Issue: 4
Year: 2011
E-Voting Protocol Based On Public-Key Cryptography PDF available

Author(s): Hayam K. Al-Anie | Mohammad A. Alia | Adnan A. Hnaif
Volume: 3
Issue: 4
Year: 2011
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption PDF available

Author(s): Jeyamala Chandrasekaran | Subramanyan B | Raman G.S
Volume: 3
Issue: 4
Year: 2011
An Ancient Indian Board Game as a Tool for Authentication PDF available

Author(s): Sreelatha Malempati | Shashi Mogalla
Volume: 3
Issue: 4
Year: 2011
Bayesian Based Comment Spam Defending Tool PDF available

Author(s): Dhinaharan Nagamalai | Beatrice Cynthia Dhinakaran | Jae Kwang Lee
Volume: 2
Issue: 4
Year: 2010
A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN PDF available

Author(s): Soumya Maity | P Bera | S K Ghosh | Pallab Dasgupta
Volume: 2
Issue: 4
Year: 2010
Emergency Response Communications and Associated Security Challenges PDF available

Author(s): Muhammad Ibrahim Channa | Kazi M. Ahmed
Volume: 2
Issue: 4
Year: 2010
Lightweight C&C based botnet detection using Aho-Corasick NFA PDF available

Author(s): Udhayan J | Anitha R | Hamsapriya T
Volume: 2
Issue: 4
Year: 2010
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks PDF available

Author(s): Emmanouil A. Panaousis | George Drew | Grant P. Millar | Tipu A. Ramrekha | Christos Politis
Volume: 2
Issue: 4
Year: 2010
Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents PDF available

Author(s): Mueen Uddin | Kamran Khowaja | Azizah Abdul Rehman
Volume: 2
Issue: 4
Year: 2010
A (2,N) Visual Cryptographic Technique for Banking Applications PDF available

Author(s): Jayanta Kumar Pal | J. K. Mandal | Kousik Dasgupta
Volume: 2
Issue: 4
Year: 2010
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-Server Environment PDF available

Author(s): Rafael Martínez-Peláez | Francisco Rico-Novella | Cristina Satizábal | Jacek Pomykała
Volume: 2
Issue: 4
Year: 2010
Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless Sensor Network PDF available

Author(s): Vikas Kumar | Rajender Kumar
Volume: 2
Issue: 4
Year: 2010
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN PDF available

Author(s): Mohammed A. Abuhelaleh | Khaled M. Elleithy
Volume: 2
Issue: 4
Year: 2010
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks PDF available

Author(s): Vivaksha Jariwala | D. C. Jinwala
Volume: 2
Issue: 4
Year: 2010
Verification of Quantum Cryptography Protocols by Model Checking PDF available

Author(s): Mohamed Elboukhari | Mostafa Azizi | Abdelmalek Azizi
Volume: 2
Issue: 4
Year: 2010
Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique PDF available

Author(s): M. Kiran Kumar | S. Mukthyar Azam | Shaik Rasool
Volume: 2
Issue: 4
Year: 2010
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FEATURES PDF available

Author(s): Angel R. Otero | Carlos E. Otero | Abrar Qureshi
Volume: 2
Issue: 4
Year: 2010
Zero Data Remnance Proof in Cloud Storage PDF available

Author(s): Mithun Paul | Ashutosh Saxena
Volume: 2
Issue: 4
Year: 2010
ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan PDF available

Author(s): Muraleedharan N | Arun Parmar
Volume: 2
Issue: 4
Year: 2010
Effective Voice Calls Admission for Authorized User in Inter VOIP Network PDF available

Author(s): Subashri T | Vaidehi V
Volume: 2
Issue: 4
Year: 2010
Improving the Reliability of Detection of LSB Replacement Steganography PDF available

Author(s): Shreelekshmi R | Wilscy M | C E Veni Madhavan
Volume: 2
Issue: 4
Year: 2010
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS PDF available

Author(s): G Dayanandam | T V Rao | S Pavan Kumar Reddy | Ravinuthala Sruthi
Volume: 5
Issue: 3
Year: 2013
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

Author(s): Lein Harn | Changlu Lin
Volume: 5
Issue: 3
Year: 2013
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters PDF available

Author(s): S.Prabhakara Rao | .E.Nagabhooshanam | S.Ramesh Babu
Volume: 5
Issue: 3
Year: 2013
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELESS AD-HOC NETWORKS PDF available

Author(s): Rajendra Aaseri | , Pankaj Choudhary | , Nirmal Roberts
Volume: 5
Issue: 3
Year: 2013
BEARINGS PROGNOSTIC USING MIXTURE OF GAUSSIANS HIDDEN MARKOV MODEL AND SUPPORT VECTOR MACHINE PDF available

Author(s): Fatima Ezzahra Sloukia | Rajae Bouarfa | Hicham Medromi | Mohammed Wahbi
Volume: 5
Issue: 3
Year: 2013
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI PDF available

Author(s): U. Pavan Kumar
Volume: 5
Issue: 3
Year: 2013
HTTPI BASED WEB SERVICE SECURITY OVER SOAP PDF available

Author(s): Pankaj Choudhary | Rajendra Aaseri | Nirmal Roberts
Volume: 5
Issue: 3
Year: 2013
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK PDF available

Author(s): Seyedeh Yasaman Rashida
Volume: 5
Issue: 3
Year: 2013
SECURITY ALGORITHMS FOR WIMAX PDF available

Author(s): M Alzaabi | K D Ranjeeth | T Alukaidey | K Salman
Volume: 5
Issue: 3
Year: 2013
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection PDF available

Author(s): P.Natesan | P.Balasubramanie
Volume: 4
Issue: 3
Year: 2012
Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation PDF available

Author(s): P. Devaki | G. Raghavendra Rao
Volume: 4
Issue: 3
Year: 2012
Provable Secure Identity Based Signcryption Schemes without Random Oracles PDF available

Author(s): Prashant Kushwah | Sunder Lal
Volume: 4
Issue: 3
Year: 2012
The New Age of Computer Virus and Their Detection PDF available

Author(s): Nitesh Kumar Dixit | Mahendra Singh Charan | Bhabesh Kumar Dey | Lokesh mishra
Volume: 4
Issue: 3
Year: 2012
Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under Water Acoustic Sensor Networks PDF available

Author(s): Padmavathy.T.V | Gayathri.V | Indhumathi.V | Karthiga.G
Volume: 4
Issue: 3
Year: 2012
Security Threats Analysis in Bluetooth-Enabled Mobile Devices PDF available

Author(s): Robayet Nasim
Volume: 4
Issue: 3
Year: 2012
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks PDF available

Author(s): Adarsh Kumar | Alok Aggarwal | Charu
Volume: 4
Issue: 3
Year: 2012
Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems PDF available

Author(s): Khalid Nasr | Anas Abou El Kalam | Christian Fraboul
Volume: 4
Issue: 3
Year: 2012
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET PDF available

Author(s): Ahmed M. Abd El-Haleem | Ihab A. Ali
Volume: 3
Issue: 3
Year: 2011
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks PDF available

Author(s): S.A.Arunmozhi | Y.Venkataramani
Volume: 3
Issue: 3
Year: 2011
Enterprise Delegation for Service Based Systems PDF available

Author(s): Coimbatore Chandersekaran | William R. Simpson
Volume: 3
Issue: 3
Year: 2011
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment PDF available

Author(s): Nirmal Dagdee | Ruchi Vijaywargiya
Volume: 3
Issue: 3
Year: 2011
System Dynamics Based Insider Threats Modelin PDF available

Author(s): Sang-Chin Yang | Yi-Lu Wang
Volume: 3
Issue: 3
Year: 2011
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services PDF available

Author(s): Urjita Thakar | Nirmal Dagdee | Sudarshan Varma
Volume: 2
Issue: 3
Year: 2010
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERROR CONCEALMENT PDF available

Author(s): Amit Phadikar | Santi P. Maity
Volume: 2
Issue: 3
Year: 2010
BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN ADHOC NETWORK PDF available

Author(s): S. Albert Raebra | S.Vijayalakshmi
Volume: 2
Issue: 3
Year: 2010
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENSOR NETWORK PDF available

Author(s): Mohammad Saiful Islam Mamun | A.F.M. Sultanul Kabir
Volume: 2
Issue: 3
Year: 2010
Securing AODV for MANETs using Message Digest with Secret Key PDF available

Author(s): Mr. Kamaljit Lakhtaria | Prof. Bhaskar N. Patel | Mr. Satish G. Prajapati | Dr. N. N. Jani
Volume: 1
Issue: 3
Year: 2009
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK PDF available

Author(s): Jean-François Lalande | David Rodriguez | Christian Toinard
Volume: 1
Issue: 3
Year: 2009
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP PDF available

Author(s): Moheb r. Girgis | Tarek m. Mahmoud | Youssef s. Takroni | hassan s. Hassan
Volume: 1
Issue: 3
Year: 2009
Data Security in Mobile Devices by GEO Locking PDF available

Author(s): M Prabu Kumar | K Praneesh Kumar Yadav
Volume: 1
Issue: 3
Year: 2009
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS PDF available

Author(s): Yasir Arfat Malkani | Lachhman Das Dhomeja
Volume: 1
Issue: 3
Year: 2009
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION PDF available

Author(s): Mohamed Abid | Songbo Song | Hassnaa Moustafa | Hossam Afifi
Volume: 1
Issue: 3
Year: 2009
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM PDF available

Author(s): Y.Bhavani | P.Niranjan Reddy
Volume: 2
Issue: 3
Year: 2010
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers PDF available

Author(s): Chang N. Zhang | Qian Yu | Xiao Wei Liu
Volume: 2
Issue: 3
Year: 2010
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT PDF available

Author(s): Johnneth Fonseca | Zair Abdelouahab | Denivaldo Lopes | Sofiane Labidi
Volume: 1
Issue: 3
Year: 2009
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions PDF available

Author(s): E.Sathiyamoorthy | N.Ch.Sriman Narayana Iyenger | V.Ramachandran
Volume: 1
Issue: 3
Year: 2009
PKI in Government Identity Management Systems PDF available

Author(s): Ali M. Al-Khouri
Volume: 3
Issue: 3
Year: 2011
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX PDF available

Author(s): Reza Amirpoor | Ajay Kumar | Satish R. Deavne
Volume: 2
Issue: 3
Year: 2010
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY PDF available

Author(s): Mohamed Elboukhari | Mostafa Azizi | Abdelmalek Azizi
Volume: 2
Issue: 3
Year: 2010
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNAMICS TIMERS PDF available

Author(s): Pavaday Narainsamy | Soyjaudah Sunjiv | Nugessur Shrikaant
Volume: 2
Issue: 3
Year: 2010
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS PDF available

Author(s): Theodore Zahariadis | Helen Leligou | Panagiotis Karkazis | Panagiotis Trakadas | Ioannis Papaefstathiou | Charalambos Vangelatos | Lionel Besson
Volume: 2
Issue: 3
Year: 2010
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NEXT GENERATION HIGH RATE WPAN PDF available

Author(s): Ayman Khalil | Matthieu Crussiere | Jean-Francois Helard
Volume: 2
Issue: 3
Year: 2010
APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATION PDF available

Author(s): Rajkumar P.V | S.K.Ghosh | Pallab Dasgupta
Volume: 1
Issue: 3
Year: 2009
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME PDF available

Author(s): Mohammed Aijaz Ahmed | D. Rajya Lakshmi | Sayed Abdul Sattar
Volume: 1
Issue: 3
Year: 2009
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification PDF available

Author(s): Ferdous A Barbhuiya | Santosh Biswas | Sukumar Nandi
Volume: 3
Issue: 3
Year: 2011
Transformation from Identity Stone Age to Digital Identity PDF available

Author(s): Mohit Kohli
Volume: 3
Issue: 3
Year: 2011
Authentication Schemes for Session Passwords Using Color and Images PDF available

Author(s): M Sreelatha | M Shashi | M Anirudh | Md Sultan Ahamer | V Manoj Kumar
Volume: 3
Issue: 3
Year: 2011
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN PDF available

Author(s): Asis Kumar Tripathy | Shradhananda Beura | Muralidhar Behera | Gunanidhi Pradhan
Volume: 3
Issue: 3
Year: 2011
Data Security Using Private Key Encryption System Based on Arithmetic Coding PDF available

Author(s): Ajit Singh | Rimple Gilhotra
Volume: 3
Issue: 3
Year: 2011
On Design of PUF-Based Random Number Generators PDF available

Author(s): Mehdi Ayat | Reza Ebrahimi Atani | Sattar Mirzakuchaki
Volume: 3
Issue: 3
Year: 2011
Countermeasure Tool - Carapace for Network Security PDF available

Author(s): Anand Bisen | Shrinivas Karwa | B.B. Meshram
Volume: 3
Issue: 3
Year: 2011
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems PDF available

Author(s): Alexis V. Pantola | Susan Pancho-Festin | Florante Salvador
Volume: 5
Issue: 2
Year: 2013
Privacy Preserving Data Mining by using Implicit Function Theorem PDF available

Author(s): Pasupuleti Rajesh | Gugulothu Narsimha
Volume: 5
Issue: 2
Year: 2013
Incident Response Plan for a Small to Medium Sized Hospital PDF available

Author(s): Charles DeVoe | Syed (Shawon) M. Rahman
Volume: 5
Issue: 2
Year: 2013
Traceback of DOS Over Autonomous Systems PDF available

Author(s): Mohammed Alenezi | Martin J Reed
Volume: 5
Issue: 2
Year: 2013
E-Commerce Systems Security for Small Businesses PDF available

Author(s): Syed (Shawon) M. Rahman | Robert Lackey
Volume: 5
Issue: 2
Year: 2013
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour PDF available

Author(s): Arpitha M | Geetha V | Gowranga K H | Bhakthavathsalam R
Volume: 5
Issue: 2
Year: 2013
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries PDF available

Author(s): Dexin Yang | Chunjing Lin | Bo Yang
Volume: 5
Issue: 2
Year: 2013
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment PDF available

Author(s): Vaishali D. Khairnar | Ketan Kotecha
Volume: 5
Issue: 2
Year: 2013
Traceback of DOS Over Autonomous Systems PDF available

Author(s): Mohammed Alenezi and Martin J Reed,
Volume: 5
Issue: 2
Year: 2013
Code Aware Dynamic Source Routing for Distributed Sensor Network PDF available

Author(s): M Abdul Rahiman | Nishanth Jain | Arun K. Dubey | G Manoj Kumar
Volume: 5
Issue: 2
Year: 2013
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment PDF available

Author(s): Shalvi Dave | Bhushan Trivedi | Jimit Mahadevia
Volume: 5
Issue: 2
Year: 2013
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering PDF available

Author(s): S.Lakshmi | V.Sankaranarayanan
Volume: 5
Issue: 2
Year: 2013
A 64 Bits Rotor Enhanced Block Cipher (Rebc3) PDF available

Author(s): Ahmed ElShafee
Volume: 5
Issue: 2
Year: 2013
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation PDF available

Author(s): Andrew Rudder | Wayne Goodridge | Shareeda Mohammed
Volume: 5
Issue: 2
Year: 2013
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks PDF available

Author(s): Leelavathi G | Shaila K | Venugopal K R | L M Patnaik
Volume: 5
Issue: 2
Year: 2013
Identification of Image Spam by Using Low Level & Metadata Features PDF available

Author(s): Anand Gupta, | Somya Aggarwal | Chhavi Singhal
Volume: 4
Issue: 2
Year: 2012
Lattice Based Tools in Cryptanalysis for Public Key Cryptography PDF available

Author(s): R.Santosh Kumar | C.Narasimham | S.Pallam Setty
Volume: 4
Issue: 2
Year: 2012
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP PDF available

Author(s): Ashvini Vyavhare | Varsharani Bhosale | Mrunal Sawant | Fazila Girkar
Volume: 4
Issue: 2
Year: 2012
LPM: A Distributed Architecture and Alogorithms for Location Privacy in LBS PDF available

Author(s): Muhamed Ilyas | R. Vijayakumar
Volume: 4
Issue: 2
Year: 2012
Forensic Analysis of Windows Registry Against Intrusion PDF available

Author(s): Haoyang Xie | Keyu Jiang | Xiaohong Yuan
Volume: 4
Issue: 2
Year: 2012
An Implementation of Intrusion Detection System Using Genetic Algorithm PDF available

Author(s): Mohammad Sazzadul Hoque | Md. Abdul Mukit | Md. Abu Naser Bikas
Volume: 4
Issue: 2
Year: 2012
Design and Analysis of a Novel Digital Image Encryption Scheme PDF available

Author(s): Narendra K Pareek,
Volume: 4
Issue: 2
Year: 2012
Cloud Computing Security in Business Information Systems PDF available

Author(s): Sasko Ristov | Marjan Gusev | Magdalena Kostoska
Volume: 4
Issue: 2
Year: 2012
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids PDF available

Author(s): G.Jacob Victor | M Sreenivasa Rao | V.CH. Venkaiah
Volume: 4
Issue: 2
Year: 2012
Minimizing the Time of Spam Mail ‎Detection by Relocating ‎Filtering System to the Sender ‎Mail Server PDF available

Author(s): Alireza Nemaney Pour | Raheleh Kholghi | Soheil Behnam Roudsari
Volume: 4
Issue: 2
Year: 2012
Cross Layer Intrusion Detection System for Wireless Sensor Network PDF available

Author(s): Djallel Eddine Boubiche | Azeddine Bilami,
Volume: 4
Issue: 2
Year: 2012
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs PDF available

Author(s): Shaik Sahil Babuand | Arnab Raha | M.K.Naskar,
Volume: 4
Issue: 2
Year: 2012
A Generic Framework for Device Pairing in Ubiquitous Computing Environments PDF available

Author(s): Yasir Arfat Malkani | Dan Chalmers, | Ian Wakeman | Lachhman Das Dhomeja
Volume: 4
Issue: 2
Year: 2012
A QoS Based MAC Protocol For Wireless Ad-hoc Network PDF available

Author(s): Vandana khare | D. SrinivasRao | Y. Madhavee Latha
Volume: 3
Issue: 2
Year: 2011
Image Encryption Based On Diffusion And Multiple Chaotic Maps PDF available

Author(s): G.A.Sathishkumar | K.Bhoopathy bagan | N.Sriraam
Volume: 3
Issue: 2
Year: 2011
Substitution-diffusion based Image Cipher PDF available

Author(s): Narendra K Pareek | Vinod Patidar | Krishan K Sud
Volume: 3
Issue: 2
Year: 2011
Stage Staffing Scheme for Copyright Protection In Multimedia PDF available

Author(s): Sumit Kumar | Santosh Kumar | Sukumar Nandi
Volume: 3
Issue: 2
Year: 2011
Replication Attack Mitigations for Static And Mobile WSN PDF available

Author(s): V.Manjula | C.Chellappan
Volume: 3
Issue: 2
Year: 2011
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password PDF available

Author(s): Tanmay Bhattacharya | Sirshendu Hore | Ayan Mukherjee | S. R. Bhadra Chaudhuri
Volume: 3
Issue: 2
Year: 2011
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption PDF available

Author(s): Jaydeep Howlader | Vivek Nair | Saikat Basu | A. K. Mal
Volume: 3
Issue: 2
Year: 2011
Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience PDF available

Author(s): C Singh | L Singh | E Marks
Volume: 3
Issue: 2
Year: 2011
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System PDF available

Author(s): Renuka Prasad.B | Annamma Abraham | Abhas Abhinav | Sunil.V.Gurlahosur | Srinivasa Y
Volume: 3
Issue: 2
Year: 2011
Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable-Length Key PDF available

Author(s): Sabyasachi Samanta | Saurabh Dutta | Goutam Sanyal
Volume: 3
Issue: 2
Year: 2011
A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks PDF available

Author(s): Mohammed Mana | Mohammed Feham | Boucif Amar Bensaber
Volume: 3
Issue: 2
Year: 2011
Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock PDF available

Author(s): Hemen Patel | Syed S. Rizvi | Laiali Almazaydeh | Aasia Riasat
Volume: 2
Issue: 2
Year: 2010
Analysis of the Security of BB84 by Model Checking PDF available

Author(s): Mohamed Elboukhari | Mostafa Azizi | Abdelmalek Azizi1
Volume: 2
Issue: 2
Year: 2010
A Survey on Trust Management for Mobile Ad Hoc Networks PDF available

Author(s): K.Seshadri Ramana | A.A. Chari | N.Kasiviswanth
Volume: 2
Issue: 2
Year: 2010
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection PDF available

Author(s): Dewan Md. Farid | Nouria Harbi | Mohammad Zahidur Rahman
Volume: 2
Issue: 2
Year: 2010
On Generation of Firewall Log Status Reporter (SRr) Using Perl PDF available

Author(s): Sugam Sharma | Hari Cohly | Tzusheng Pei
Volume: 1
Issue: 2
Year: 2009
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations PDF available

Author(s): Harry Yosh
Volume: 3
Issue: 2
Year: 2011
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET PDF available

Author(s): T.V.P.Sundararajan | A.Shanmugam
Volume: 2
Issue: 2
Year: 2010
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS PDF available

Author(s): S.Sangeetha | V.Vaidehi
Volume: 2
Issue: 2
Year: 2010
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags PDF available

Author(s): Eslam Gamal Ahmed | Eman Shaaban | Mohamed Hashem
Volume: 2
Issue: 2
Year: 2010
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem PDF available

Author(s): Rajesh P Singh | Anupam Saikia | B. K. Sarma
Volume: 2
Issue: 2
Year: 2010
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration PDF available

Author(s): Alan Mink | Sheila Frankel | Ray Perlner
Volume: 1
Issue: 2
Year: 2009
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGENEOUS WIRELESS PACKET NETWORKS PDF available

Author(s): G.M.Tamilselvan | Dr.A.Shanmugam
Volume: 1
Issue: 2
Year: 2009
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS PDF available

Author(s): Eric Ke Wang | Lucas C.K.Hui | S.M.Yiu
Volume: 1
Issue: 2
Year: 2009
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2) PDF available

Author(s): Ulrich Herberg | Thomas Clausen
Volume: 2
Issue: 2
Year: 2010
Trust Based Content Distribution for Peer-To-Peer Overlay Networks PDF available

Author(s): S.Ayyasamy | S.N. Sivanandam
Volume: 2
Issue: 2
Year: 2010
Impersonation Attack on EKE Protocol PDF available

Author(s): Shirisha Tallapally
Volume: 2
Issue: 2
Year: 2010
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor PDF available

Author(s): Mohsen Machhout | Zied Guitouni | Kholdoun Torki | Lazhar Khriji | Rached Tourki
Volume: 2
Issue: 2
Year: 2010
Events Classification in Log Audit PDF available

Author(s): Sabah Al-Fedaghi | Fahad Mahdi
Volume: 2
Issue: 2
Year: 2010
INTELLIGENT INTRUSION DETECTION SYSTEM FRAMEWORK USING MOBILE AGENTS PDF available

Author(s): N.Jaisankar | R.Saravanan | K. Durai Swamy
Volume: 1
Issue: 2
Year: 2009
Clustered Hierarchy in Sensor Networks: Performance and Security PDF available

Author(s): Mohammed Abuhelaleh | Khaled Elleithy | Thabet Mismar
Volume: 1
Issue: 2
Year: 2009
DYNAMIC IDP SIGNATURE PROCESSING BY FAST ELIMINATION USING DFA PDF available

Author(s): Mohammed Misbahuddin | Sachin Narayanan | Bishwa Ranjan Ghosh
Volume: 1
Issue: 2
Year: 2009
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTION PDF available

Author(s): Natasa Zivic
Volume: 1
Issue: 2
Year: 2009
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES PDF available

Author(s): Yoshito Kanamori | Seong-Moo Yoo
Volume: 1
Issue: 2
Year: 2009
Resonance Based Micromechanical Cantilever for Gas Sensing PDF available

Author(s): Subhashini. S | Vimala Juliet. A
Volume: 5
Issue: 1
Year: 2013
Text Steganographic Approaches: A Comparison PDF available

Author(s): Monika Agarwal
Volume: 5
Issue: 1
Year: 2013
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines PDF available

Author(s): A. M. Chandrashekhar | K. Raghuveer
Volume: 5
Issue: 1
Year: 2013
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study PDF available

Author(s): Aidarus M. Ibrahim | Hussein A. Hashi | Abdullalem A. Mohamed
Volume: 5
Issue: 1
Year: 2013
How to Find a Fixed Point in Shuffle Efficiently PDF available

Author(s): Mikako Kageshima | ManabuOkamoto
Volume: 5
Issue: 1
Year: 2013
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers PDF available

Author(s): Kuo-Tsang Huang | Jung-Hui Chiu | Sung-Shiou Shen
Volume: 5
Issue: 1
Year: 2013
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study PDF available

Author(s): Natarajan Meghanathan
Volume: 5
Issue: 1
Year: 2013
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine PDF available

Author(s): Besma Othmani | Mohsen Machhout | Houcine Mejri | Hafedh Belmabrouk | Rached Tourki
Volume: 4
Issue: 1
Year: 2012
A Security Suite for Wireless Body Area Networks PDF available

Author(s): Raghav V. Sampangi | Saurabh Dey | Shalini R. Urs | Srinivas Sampalli
Volume: 4
Issue: 1
Year: 2012
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security PDF available

Author(s): Minal Moharir | A V Suresh
Volume: 4
Issue: 1
Year: 2012
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks PDF available

Author(s): Sridhar Subramanian | Baskaran Ramachandran
Volume: 4
Issue: 1
Year: 2012
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network PDF available

Author(s): G.Padmavathi | P.Subashini | D.Devi Aruna
Volume: 4
Issue: 1
Year: 2012
Risks and Remedies in E-Learning System PDF available

Author(s): Nikhilesh Barik | Sunil Karforma
Volume: 4
Issue: 1
Year: 2012
Efficient & Secure Data Hiding Using Secret Reference Matrix PDF available

Author(s): Laxman Tawade | Rajshree Mahajan | Chandan Kulthe
Volume: 4
Issue: 1
Year: 2012
Protected Data Objects Replication in Data Grid PDF available

Author(s): G. Aruna Kranthi | D. Shashi Rekha
Volume: 4
Issue: 1
Year: 2012
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots PDF available

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
Volume: 4
Issue: 1
Year: 2012
Optimizing One Fair Document Exchange Protocol PDF available

Author(s): Abdullah M. Alaraj
Volume: 4
Issue: 1
Year: 2012
A Human-Centric Approach To Group-Based Context-Awareness PDF available

Author(s): Nasser Ghadiri | Ahmad Baraani-Dastjerdi | Nasser Ghasem-Aghaee | Mohammad A. Nematbakhsh
Volume: 3
Issue: 1
Year: 2011
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALGORITHM FOR VOIP PDF available

Author(s): Suardinata | Kamalrulnizam bin Abu Bakar | Nimitr Suanmali
Volume: 3
Issue: 1
Year: 2011
Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options PDF available

Author(s): Ishtiaq Ali | Natarajan Meghanathan
Volume: 3
Issue: 1
Year: 2011
PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE STORAGE ARCHITECTURES PDF available

Author(s): Wassim Itani | Ayman Kayssi | Ali Chehab
Volume: 2
Issue: 1
Year: 2010
Advanced Security Management in Metro Ethernet Networks PDF available

Author(s): Ammar Rayes
Volume: 2
Issue: 1
Year: 2010
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA PDF available

Author(s): Natarajan Meghanathan | Lopamudra Nayak
Volume: 2
Issue: 1
Year: 2010
Analysis of Web Logs And Web User In Web Mining PDF available

Author(s): L.K. Joshila Grace | V.Maheswari | Dhinaharan Nagamalai
Volume: 3
Issue: 1
Year: 2011
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector PDF available

Author(s): Iwendi, C. O. | Allen, A. R.
Volume: 3
Issue: 1
Year: 2011
An Overview Of The Security Concerns In Enterprise Cloud Computing PDF available

Author(s): Anthony Bisong | Syed (Shawon) M. Rahman
Volume: 3
Issue: 1
Year: 2011
COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION PDF available

Author(s): Syed S. Rizvi | Aasia Riasat | Khaled M. Elleithy
Volume: 2
Issue: 1
Year: 2010
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES PDF available

Author(s): Omessaad Hamdi | Manel abdelhedi | Ammar Bouallegue | Sami Harari
Volume: 2
Issue: 1
Year: 2010
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS PDF available

Author(s): Yan Luo
Volume: 2
Issue: 1
Year: 2010
A Frame Work for Ontological Privacy Preserved Mining PDF available

Author(s): Geetha Mary. A | Sriman Narayana Iyengar. N.Ch.
Volume: 2
Issue: 1
Year: 2010
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS PDF available

Author(s): Natarajan Meghanathan | Sumanth Reddy Allam | Loretta A. Moore
Volume: 1
Issue: 1
Year: 2009
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION PDF available

Author(s): Rung-Ching Chen | Kai-Fan Cheng | Chia-Fen Hsieh
Volume: 1
Issue: 1
Year: 2009
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC NETWORKS PDF available

Author(s): Debdutta Barman Roy | Rituparna Chaki | Nabendu Chaki
Volume: 1
Issue: 1
Year: 2009
Failure of A Mix Network PDF available

Author(s): Kun Peng
Volume: 3
Issue: 1
Year: 2011
Save time & money - Smart Internet Solutions      Why do you need a reservation system?