Normalized Image Watermarking Scheme Using Chaotic System
Author(s): G Rosline NesaKumari | S. Maruthuperumal
Volume: 1
Issue: 4
Year: 2012




Face Recognition using Tchebichef Moments
Author(s): Sri dhar Dasari | Sridhar Dasari
Volume: 1
Issue: 4
Year: 2012




Evaluation of Field Phishing Study Setup Method
Author(s): Yunsang Oh | Takashi Obi
Volume: 1
Issue: 4
Year: 2012




Legal, Ethical & Social Issues in the case of an Intrusive Remote Monitoring Software
Author(s): Shaun McBrearty | Nigel McKelvey | Kevin Curran
Volume: 1
Issue: 4
Year: 2012




Mitigation of the Excessive Non-ionized Radiation of Base Transceiver in Developing Countries
Author(s): Rakhi Roy | Himadri Subrah Saha
Volume: 1
Issue: 4
Year: 2012




Novel cipher technique using substitution method
Author(s): Avimanyou Kumar Vatsa | Tanmeya Mohan | Shobha Vatsa
Volume: 1
Issue: 4
Year: 2012




Effective Performance of Dynamic Source Routing Protocol on Random Waypoint Model (RWM) Using CBR
Author(s): jogendra kumar
Volume: 1
Issue: 4
Year: 2012




Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set
Author(s): chandrashekhar A. M. | Raghuveer K.
Volume: 1
Issue: 4
Year: 2012




Knowledge Extraction From Trained Neural Networks
Author(s): koushal kumar
Volume: 1
Issue: 4
Year: 2012




Attack on Fully Homomorphic Encryption over the Integers
Author(s): Gu Chunsheng
Volume: 1
Issue: 4
Year: 2012




Portable SCADA Security Toolkits
Author(s): Guillermo Francia | Nourredine Beckhouche | Terry Marbut | Curtis Neuman
Volume: 1
Issue: 4
Year: 2012




Pattern Based Network Security Using Semi-supervised Learning
Author(s): Vinod K Pachghare | Vaibhav K Khatavkar | Parag A Kulkarni
Volume: 1
Issue: 3
Year: 2012




Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM)
Author(s): jogendra kumar
Volume: 1
Issue: 3
Year: 2012




Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC
Author(s): El Hassan El Kinani | Fatima Amounas
Volume: 1
Issue: 3
Year: 2012




A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications
Author(s): abri mehadji | H. Badaoui | Z. Berber
Volume: 1
Issue: 3
Year: 2012




An Efficient ID-Based Proxy Signcryption Scheme
Author(s): G. Swapna | P.V.S.S.N Gopal | T. Gowri | P. Vasudeva Reddy
Volume: 1
Issue: 3
Year: 2012




Performance Evaluation of UWB Wireless Link
Author(s): Joanne Gomes | B.K. Mishra
Volume: 1
Issue: 3
Year: 2012




Compact and Integrated Routing Photonic Crystals Structures Design Using the Two-dimensional FDTD Method
Author(s): badaoui hadjira | Mohammed Feham | Mehadji Abri
Volume: 1
Issue: 3
Year: 2012




Client Side CSRF Defensive Tool
Author(s): Rupali kombade | B.B. Meshram
Volume: 1
Issue: 3
Year: 2012




Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords
Author(s): Kameswara Rao | Sushma Yalamanchili
Volume: 1
Issue: 3
Year: 2012




A New Signature Scheme Based on Factoring and Discrete Logarithm Problems
Author(s): Swati Verma | Birendra Kumar Sharma
Volume: 1
Issue: 3
Year: 2012




Performance Analysis of Load Minimization In AODV and FSR
Author(s): G vetrichelvi | G Mohankumar
Volume: 1
Issue: 3
Year: 2012




An Efficient Signcryption Scheme based on The Elliptic Curve Discrete Logarithm Problem
Author(s): Fatima Amounas | El Hassan Kinani
Volume: 2
Issue: 3
Year: 2013




Energy Efficient Approach to Target Localisation in Wireless Sensor Networks
Author(s): gamal abdel fadeel khalaf | Hesham Zarief Badr
Volume: 2
Issue: 3
Year: 2013




Overload Pattern classification For Server Overload Detection
Author(s): san hlaing myint
Volume: 2
Issue: 3
Year: 2013




Secured data transmission in a V-Blast encoded MIMO MCCDMA wireless communication system
Author(s): Mousumi Haque | Most. Farjana Sharmin | Shaikh E nayet Ullah
Volume: 2
Issue: 3
Year: 2013




Algorithm to Detect Spurious Communications in Vehicular Ad hoc Networks
Author(s): Muhammad Aamir | Shabbir Mukhi
Volume: 2
Issue: 3
Year: 2013




Enhanced 4-way Handshake Process in IEEE802.11i with Cookies
Author(s): Hemraj Saini | Kapil Dev Sharma | Pankaj Dadheech | Tarini charan Panda
Volume: 2
Issue: 3
Year: 2013




PSO and ACO Algorithms Applied to Optimization Resource Allocation to Support QoS Requirements in NGN
Author(s): Dac-Nhuong Le
Volume: 2
Issue: 3
Year: 2013




Intelligent Driver Mobility Model and Traffic Pattern Generation based Optimization of Reactive Protocols for Vehicular Ad-hoc Networks
Author(s): Vaibhav Godbole
Volume: 2
Issue: 3
Year: 2013




Quantum password sharing scheme using trusted servers
Author(s): Gabriela Mogos
Volume: 2
Issue: 3
Year: 2013




Mobile Geographic Information System Platform (MGISP): A GPS Information Collection System
Author(s): Abdelilah Azyat | Naoufal Raissouni | Nizar Ben Achhab | Mohamad Lahraoua | Asaad Chahboun
Volume: 1
Issue: 2
Year: 2012




GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver
Author(s): Abdellah El Abbous
Volume: 1
Issue: 2
Year: 2012




A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael
Author(s): Samir El Adib | Naoufal Raissouni | Asaad Chahboun | Abdelilah Azyat | Mohammed Lahraoua | Nizar Ben Achhab | Omar Benarchid | Abdellah Abbous
Volume: 1
Issue: 2
Year: 2012




AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization
Author(s): Samir El Adib | Naoufal Raissouni
Volume: 1
Issue: 2
Year: 2012




A Trust Based Approach For Secure Access Control In Information Centric Network
Author(s): Sapna Singh
Volume: 1
Issue: 2
Year: 2012




Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Author(s): Tharindu Darshana Bandara Weerasinghe
Volume: 1
Issue: 2
Year: 2012




Peak-Throughput of LTE-Release 10 for Up/Down Link Physical Layer
Author(s): Aws yonis | M.F.L. Abdullah
Volume: 1
Issue: 2
Year: 2012




SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message
Author(s): Somdip Dey
Volume: 1
Issue: 2
Year: 2012




A New Proxy Blind Signature Scheme Based on DLP
Author(s): SWATI VERMA | Birendra Kumar Sharma
Volume: 1
Issue: 2
Year: 2012




Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography
Author(s): El Hassan El Kinani
Volume: 1
Issue: 2
Year: 2012




A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model
Author(s): Anubhav Chitrey | Dharmendra Singh | Vrijendra Singh
Volume: 1
Issue: 2
Year: 2012




An Architecture of Hybrid Intrusion Detection System
Author(s): Kanubhai K Patel | Bharat V Buddhadev
Volume: 2
Issue: 2
Year: 2012




A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin ½ Matrices
Author(s): Fatima Amounas | El Hassan El Kinani
Volume: 2
Issue: 2
Year: 2012




Directional Antenna Assisted Scheme to Reduce Localization Error in Wireless Sensor Networks
Author(s): Tarun Dubey | O.P. Sahu
Volume: 2
Issue: 2
Year: 2012




Codes Correcting Blockwise s-Periodic Errors
Author(s): Pankaj Kr Das | Vinod Tyagi
Volume: 2
Issue: 2
Year: 2012




Hierarchical Wireless Mesh Networks Scalable Secure Framework
Author(s): ganesh reddy karri | P. Santi Thilagam
Volume: 2
Issue: 2
Year: 2012




Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks
Author(s): Diana Jeba Jingle | Elijah Blessing Rajsingh
Volume: 2
Issue: 2
Year: 2012




PKC Scheme Based on DDLP
Author(s): Chandrashekhar Meshram | Suchitra A. Meshram
Volume: 2
Issue: 2
Year: 2012




Moments and Similarity Measure Feature Based Image Steganalysis Technique (MSM)
Author(s): Souvik Bhattacharyya | Gautam Sanyal
Volume: 2
Issue: 2
Year: 2012




A New Genetic Algorithm for the Optimal Centralized Wireless Access Network
Author(s): Dac-Nhuong Le
Volume: 2
Issue: 2
Year: 2012




PCI Compliance – No excuses, please
Author(s): Martin Harran | Nigel McKelvey
Volume: 2
Issue: 2
Year: 2012




Developing a Secure Programming Module to cope with Modern Vulnerabilities
Author(s): Nigel McKelvey
Volume: 1
Issue: 1
Year: 2012




The Transmission Multicast and The Control of QoS for IPV6 Using The Insfrastructure MPLS
Author(s): Augustin WAYAWO
Volume: 1
Issue: 1
Year: 2012




Improved G-3PAKE Protocol with Formal Verification
Author(s): Manju Sanghi
Volume: 1
Issue: 1
Year: 2012




Synthetic Feature Transformation with RBF neural network to improve the Intrusion Detection System Accuracy and Decrease Computational Costs
Author(s): Saeid Asgari Taghanaki | Behzad Zamani Dehkordi | Ahmad Hatam | Behzad Bahraminejad
Volume: 1
Issue: 1
Year: 2012




Solving the File Allocation Problem in the Distributed Networks by Using Genetic Algorithms
Author(s): Moatamad Hassan | A. Younes | M. R Hassan | H. Abdo
Volume: 2
Issue: 1
Year: 2012




An Efficient RSA Cryptosystem with BM-PRIME Method
Author(s): Sushma Pradhan | Birendra Kumar Sharma
Volume: 2
Issue: 1
Year: 2012




W2BC: A Proposal for a Converged Baseband Implementation of WiMax and WiFi Transceivers
Author(s): ihsan lami | Ali Al-Sherbaz
Volume: 2
Issue: 1
Year: 2012




Modeling and Verification of Access Rights in Take-Grant Protection Model Using Colored Petri Nets
Author(s): Saeid Pashazadeh
Volume: 2
Issue: 1
Year: 2012




Split-Window LST Algorithms Estimation From AVHRR/NOAA Satellites (7, 9, 11, 12, 14, 15, 16, 17, 18, 19) Using Gaussian Filter Function
Author(s): Mohammed Lahraoua | Naoufal Raissouni | Asaad Chahboun | Abdelilah Azyat | Nizar Ben Achhab
Volume: 2
Issue: 1
Year: 2012




An Optimal Sinsing Algorithm for Multiband Cognitive Radio Network
Author(s): Gamal Abdel Fadeel Khalaf
Volume: 2
Issue: 1
Year: 2012




Service-Oriented Management for Internet of Things
Author(s): Hui Xu | Wei Liu | Chunzhi Wang | Hongwei Chen
Volume: 2
Issue: 1
Year: 2012




Construction Efficiency of the Elliptic Curve Cryptosystem using Code Computing for Amazigh Alphabet
Author(s): Fatima Amounas | El Hassan El Kinani
Volume: 2
Issue: 1
Year: 2012




Identifying Phishing Threats in Government Web Services
Author(s): Yunsang Oh | Takashi Obi
Volume: 2
Issue: 1
Year: 2012




Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO)
Author(s): Arindam Sarkar | J. K. Mandal
Volume: 2
Issue: 1
Year: 2012




Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces
Author(s): Tyson Brooks | Lee McKnight
Volume: 2
Issue: 1
Year: 2012



