Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Security

ISSN: 1985--2320
Publisher: Computer Science Journals


ADD TO MY LIST
 
A Secure Communication Model for Voting Application Using Multiple Mobile Agents PDF available

Author(s): E. A. Mary Anita | V. Vasudevan
Volume: 3
Issue: 6
Year: 2009
Secure E-payment Protocol PDF available

Author(s): Sattar J Aboud
Volume: 3
Issue: 5
Year: 2009
Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment PDF available

Author(s): Iyad Aldasouqi | Walid Salameh
Volume: 4
Issue: 5
Year: 2010
Protection of Patient Identity and Privacy Using Vascular Biometrics PDF available

Author(s): C.Lakshmi Deepika | A.Kandaswamy | C.Vimal
Volume: 4
Issue: 5
Year: 2010
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents

Author(s): Omid Mahdi Ebadati E. | Harleen Kaur | M. Afshar Alam
Volume: 4
Issue: 4
Year: 2010
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids PDF available

Author(s): Ajay Prasad | Saurabh Singh Verma | Ashok Kumar Sharma
Volume: 3
Issue: 4
Year: 2009
Criminal and Civil Identification with DNA Databases Using Bayesian Networks PDF available

Author(s): Marina Andrade | Manuel Alberto M. Ferreira
Volume: 3
Issue: 4
Year: 2009
Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication PDF available

Author(s): AAmir Shahzad | Shahrulniza Musa
Volume: 6
Issue: 3
Year: 2012
Blinded Montgomery Powering Ladder Protected Against the Jacobi Symbol Attack PDF available

Author(s): David Tinoco Varela
Volume: 6
Issue: 3
Year: 2012
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks PDF available

Author(s): J.Samuel Manoharan, Dr.Kezi C.Vijila & A.Sathesh
Volume: 4
Issue: 3
Year: 2010
Evaluation of Potential Manufacturing Suppliers Using Analytical Hierarchy Process and Cluster Analysis for Benchmarking PDF available

Author(s): A. Adnan | A. Cazan | M. Safa | A.W.M Lung | G. Williams
Volume: 3
Issue: 3
Year: 2009
Low Power Elliptic Curve Digital Signature Design for Constrained Devices PDF available

Author(s): Elhadjyoussef Wajih | Benhadjyoussef Noura | Machhout Mohsen | Tourki Rached
Volume: 6
Issue: 2
Year: 2012
A Novel Approach for Image Steganography in Spatial Domain Using Last Two Bits of Pixel Value PDF available

Author(s): A Novel Approach for Image Steganography in Spatial Domain Using Last Two Bits of Pixel Value
Volume: 5
Issue: 2
Year: 2011
A Spectral Domain Local Feature Extraction Algorithm for Face Recognition PDF available

Author(s): Shaikh Anowarul Fattah, Hafiz Imtiaz
Volume: 5
Issue: 2
Year: 2011
Smart Card Security; Technology and Adoption PDF available

Author(s): Hamed Taherdoost | Shamsul Sahibuddin | Neda Jalaliyoon
Volume: 5
Issue: 2
Year: 2011
Techniques in Computer Forensics: A Recovery Perspective PDF available

Author(s): Bhanu Prakash Battula | B. Kezia Rani | R. Satya Prasad | T. Sudha
Volume: 3
Issue: 2
Year: 2009
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobile Networks PDF available

Author(s): Mustafa AL-Fayoumi | Ja’afer AL-Saraireh
Volume: 5
Issue: 1
Year: 2011
Medical Information Security PDF available

Author(s): William C. Figg, Ph.D. | Hwee Joo Kam, M.S.
Volume: 5
Issue: 1
Year: 2011
An Exploratory Study of the Security Management Practices of Hispanic Students PDF available

Author(s): Yi-Chia Wu | Francis Kofi Andoh-Baidoo | Robert Crossler | Jesus Tanguma
Volume: 5
Issue: 1
Year: 2011
TUX-TMS: Thapar University Extensible-Trust Management System

Author(s): Shashi Bhanwar | Seema Bawa
Volume: 4
Issue: 1
Year: 2010
Multi-Dimensional Privacy Protection for Digital Collaborations PDF available

Author(s): Geoff Skinner
Volume: 1
Issue: 1
Year: 2007
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm PDF available

Author(s): Bibhudendra Acharya | Girija Sankar Rath | Sarat Kumar Patra | Saroj Kumar Panigrahy
Volume: 1
Issue: 1
Year: 2007
Biometrics Security using Steganography PDF available

Author(s): Chander Kant | Rajender Nath | Sheetal Chaudhary
Volume: 2
Issue: 1
Year: 2008
A Trust Conscious Secure Route Data Communication in MANETS PDF available

Author(s): Dr. Anil Kapil | Mr. Rajneesh Gujral
Volume: 3
Issue: 1
Year: 2009
Identity-Based Key Management in MANETs using Public Key Cryptography PDF available

Author(s): Dr. Anil Kapil | Mr. Sanjeev Rana
Volume: 3
Issue: 1
Year: 2009
A Secure Communication Model for Voting Application Using Multiple Mobile Agents PDF available

Author(s): D.S.Adane | S.R.Sathe
Volume: 4
Issue: 1
Year: 2010
Secure Group Communication in Grid Environment PDF available

Author(s): Dr Sudha Sadasivam G, Ruckmani V & Anitha Kumari K
Volume: 4
Issue: 1
Year: 2010
MODIFIED APPROACH FOR SECURING REAL TIME APPLICATION ON CLUSTERS PDF available

Author(s): Abhishek Songra | Rama Shankar Yadav | Sarsij Tripathi
Volume: 1
Issue: 1
Year: 2007
Performance Analysis of Mobile Security Protocols: Encryption and Authentication PDF available

Author(s): Anita Singhrova | Dr. Nupur Prakash
Volume: 1
Issue: 1
Year: 2007
Separation of Duty and Context Constraints For Contextual Role-Based Access Control (C-RBAC)

Author(s): Muhammad Nabeel Tahir
Volume: 3
Issue: 1
Year: 2009
Save time & money - Smart Internet Solutions     Free Forms + CRM