Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Information and Network Security (IJINS)

ISSN: 2089--3299
Publisher: Institute of Advanced Engineering and Science


ADD TO MY LIST
 
Normalized Image Watermarking Scheme Using Chaotic System

Author(s): G Rosline NesaKumari | S. Maruthuperumal
Volume: 1
Issue: 4
Year: 2012
Face Recognition using Tchebichef Moments

Author(s): Sri dhar Dasari | Sridhar Dasari
Volume: 1
Issue: 4
Year: 2012
Evaluation of Field Phishing Study Setup Method

Author(s): Yunsang Oh | Takashi Obi
Volume: 1
Issue: 4
Year: 2012
Legal, Ethical & Social Issues in the case of an Intrusive Remote Monitoring Software

Author(s): Shaun McBrearty | Nigel McKelvey | Kevin Curran
Volume: 1
Issue: 4
Year: 2012
Mitigation of the Excessive Non-ionized Radiation of Base Transceiver in Developing Countries

Author(s): Rakhi Roy | Himadri Subrah Saha
Volume: 1
Issue: 4
Year: 2012
Novel cipher technique using substitution method

Author(s): Avimanyou Kumar Vatsa | Tanmeya Mohan | Shobha Vatsa
Volume: 1
Issue: 4
Year: 2012
Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set

Author(s): chandrashekhar A. M. | Raghuveer K.
Volume: 1
Issue: 4
Year: 2012
Knowledge Extraction From Trained Neural Networks

Author(s): koushal kumar
Volume: 1
Issue: 4
Year: 2012
Attack on Fully Homomorphic Encryption over the Integers

Author(s): Gu Chunsheng
Volume: 1
Issue: 4
Year: 2012
Portable SCADA Security Toolkits

Author(s): Guillermo Francia | Nourredine Beckhouche | Terry Marbut | Curtis Neuman
Volume: 1
Issue: 4
Year: 2012
Pattern Based Network Security Using Semi-supervised Learning

Author(s): Vinod K Pachghare | Vaibhav K Khatavkar | Parag A Kulkarni
Volume: 1
Issue: 3
Year: 2012
Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC

Author(s): El Hassan El Kinani | Fatima Amounas
Volume: 1
Issue: 3
Year: 2012
A Bow-Tie Bluetooth/Wimax Antenna Design for Wireless Networks Applications

Author(s): abri mehadji | H. Badaoui | Z. Berber
Volume: 1
Issue: 3
Year: 2012
An Efficient ID-Based Proxy Signcryption Scheme

Author(s): G. Swapna | P.V.S.S.N Gopal | T. Gowri | P. Vasudeva Reddy
Volume: 1
Issue: 3
Year: 2012
Performance Evaluation of UWB Wireless Link

Author(s): Joanne Gomes | B.K. Mishra
Volume: 1
Issue: 3
Year: 2012
Compact and Integrated Routing Photonic Crystals Structures Design Using the Two-dimensional FDTD Method

Author(s): badaoui hadjira | Mohammed Feham | Mehadji Abri
Volume: 1
Issue: 3
Year: 2012
Client Side CSRF Defensive Tool

Author(s): Rupali kombade | B.B. Meshram
Volume: 1
Issue: 3
Year: 2012
Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords

Author(s): Kameswara Rao | Sushma Yalamanchili
Volume: 1
Issue: 3
Year: 2012
A New Signature Scheme Based on Factoring and Discrete Logarithm Problems

Author(s): Swati Verma | Birendra Kumar Sharma
Volume: 1
Issue: 3
Year: 2012
Performance Analysis of Load Minimization In AODV and FSR

Author(s): G vetrichelvi | G Mohankumar
Volume: 1
Issue: 3
Year: 2012
An Efficient Signcryption Scheme based on The Elliptic Curve Discrete Logarithm Problem

Author(s): Fatima Amounas | El Hassan Kinani
Volume: 2
Issue: 3
Year: 2013
Energy Efficient Approach to Target Localisation in Wireless Sensor Networks

Author(s): gamal abdel fadeel khalaf | Hesham Zarief Badr
Volume: 2
Issue: 3
Year: 2013
Overload Pattern classification For Server Overload Detection

Author(s): san hlaing myint
Volume: 2
Issue: 3
Year: 2013
Secured data transmission in a V-Blast encoded MIMO MCCDMA wireless communication system

Author(s): Mousumi Haque | Most. Farjana Sharmin | Shaikh E nayet Ullah
Volume: 2
Issue: 3
Year: 2013
Algorithm to Detect Spurious Communications in Vehicular Ad hoc Networks

Author(s): Muhammad Aamir | Shabbir Mukhi
Volume: 2
Issue: 3
Year: 2013
Enhanced 4-way Handshake Process in IEEE802.11i with Cookies

Author(s): Hemraj Saini | Kapil Dev Sharma | Pankaj Dadheech | Tarini charan Panda
Volume: 2
Issue: 3
Year: 2013
Quantum password sharing scheme using trusted servers

Author(s): Gabriela Mogos
Volume: 2
Issue: 3
Year: 2013
Mobile Geographic Information System Platform (MGISP): A GPS Information Collection System

Author(s): Abdelilah Azyat | Naoufal Raissouni | Nizar Ben Achhab | Mohamad Lahraoua | Asaad Chahboun
Volume: 1
Issue: 2
Year: 2012
GPS signal accuracy and coverage analysis platform: Application to Trimble Juno SB receiver

Author(s): Abdellah El Abbous
Volume: 1
Issue: 2
Year: 2012
A Reconfigurable Cryptography Coprocessor RCC for Advanced Encryption Standard AES/Rijndael

Author(s): Samir El Adib | Naoufal Raissouni | Asaad Chahboun | Abdelilah Azyat | Mohammed Lahraoua | Nizar Ben Achhab | Omar Benarchid | Abdellah Abbous
Volume: 1
Issue: 2
Year: 2012
AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization

Author(s): Samir El Adib | Naoufal Raissouni
Volume: 1
Issue: 2
Year: 2012
Review on Attack and Defense in Tor

Author(s): Muhammad Aamir
Volume: 1
Issue: 2
Year: 2012
A Trust Based Approach For Secure Access Control In Information Centric Network

Author(s): Sapna Singh
Volume: 1
Issue: 2
Year: 2012
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms

Author(s): Tharindu Darshana Bandara Weerasinghe
Volume: 1
Issue: 2
Year: 2012
Peak-Throughput of LTE-Release 10 for Up/Down Link Physical Layer

Author(s): Aws yonis | M.F.L. Abdullah
Volume: 1
Issue: 2
Year: 2012
A New Proxy Blind Signature Scheme Based on DLP

Author(s): SWATI VERMA | Birendra Kumar Sharma
Volume: 1
Issue: 2
Year: 2012
Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography

Author(s): El Hassan El Kinani
Volume: 1
Issue: 2
Year: 2012
A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model

Author(s): Anubhav Chitrey | Dharmendra Singh | Vrijendra Singh
Volume: 1
Issue: 2
Year: 2012
An Architecture of Hybrid Intrusion Detection System

Author(s): Kanubhai K Patel | Bharat V Buddhadev
Volume: 2
Issue: 2
Year: 2012
A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin ½ Matrices

Author(s): Fatima Amounas | El Hassan El Kinani
Volume: 2
Issue: 2
Year: 2012
Directional Antenna Assisted Scheme to Reduce Localization Error in Wireless Sensor Networks

Author(s): Tarun Dubey | O.P. Sahu
Volume: 2
Issue: 2
Year: 2012
Codes Correcting Blockwise s-Periodic Errors

Author(s): Pankaj Kr Das | Vinod Tyagi
Volume: 2
Issue: 2
Year: 2012
Hierarchical Wireless Mesh Networks Scalable Secure Framework

Author(s): ganesh reddy karri | P. Santi Thilagam
Volume: 2
Issue: 2
Year: 2012
Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks

Author(s): Diana Jeba Jingle | Elijah Blessing Rajsingh
Volume: 2
Issue: 2
Year: 2012
PKC Scheme Based on DDLP

Author(s): Chandrashekhar Meshram | Suchitra A. Meshram
Volume: 2
Issue: 2
Year: 2012
Moments and Similarity Measure Feature Based Image Steganalysis Technique (MSM)

Author(s): Souvik Bhattacharyya | Gautam Sanyal
Volume: 2
Issue: 2
Year: 2012
A New Genetic Algorithm for the Optimal Centralized Wireless Access Network

Author(s): Dac-Nhuong Le
Volume: 2
Issue: 2
Year: 2012
Creating enhanced Wikileaks

Author(s): Amr Galal | Hesham Hassan
Volume: 2
Issue: 2
Year: 2012
PCI Compliance – No excuses, please

Author(s): Martin Harran | Nigel McKelvey
Volume: 2
Issue: 2
Year: 2012
Developing a Secure Programming Module to cope with Modern Vulnerabilities

Author(s): Nigel McKelvey
Volume: 1
Issue: 1
Year: 2012
Improved G-3PAKE Protocol with Formal Verification

Author(s): Manju Sanghi
Volume: 1
Issue: 1
Year: 2012
A Password attack on S-3 PAKE Protocol

Author(s): Shirisha Tallapally
Volume: 1
Issue: 1
Year: 2012
Synthetic Feature Transformation with RBF neural network to improve the Intrusion Detection System Accuracy and Decrease Computational Costs

Author(s): Saeid Asgari Taghanaki | Behzad Zamani Dehkordi | Ahmad Hatam | Behzad Bahraminejad
Volume: 1
Issue: 1
Year: 2012
Solving the File Allocation Problem in the Distributed Networks by Using Genetic Algorithms

Author(s): Moatamad Hassan | A. Younes | M. R Hassan | H. Abdo
Volume: 2
Issue: 1
Year: 2012
An Efficient RSA Cryptosystem with BM-PRIME Method

Author(s): Sushma Pradhan | Birendra Kumar Sharma
Volume: 2
Issue: 1
Year: 2012
W2BC: A Proposal for a Converged Baseband Implementation of WiMax and WiFi Transceivers

Author(s): ihsan lami | Ali Al-Sherbaz
Volume: 2
Issue: 1
Year: 2012
Split-Window LST Algorithms Estimation From AVHRR/NOAA Satellites (7, 9, 11, 12, 14, 15, 16, 17, 18, 19) Using Gaussian Filter Function

Author(s): Mohammed Lahraoua | Naoufal Raissouni | Asaad Chahboun | Abdelilah Azyat | Nizar Ben Achhab
Volume: 2
Issue: 1
Year: 2012
An Optimal Sinsing Algorithm for Multiband Cognitive Radio Network

Author(s): Gamal Abdel Fadeel Khalaf
Volume: 2
Issue: 1
Year: 2012
Service-Oriented Management for Internet of Things

Author(s): Hui Xu | Wei Liu | Chunzhi Wang | Hongwei Chen
Volume: 2
Issue: 1
Year: 2012
Construction Efficiency of the Elliptic Curve Cryptosystem using Code Computing for Amazigh Alphabet

Author(s): Fatima Amounas | El Hassan El Kinani
Volume: 2
Issue: 1
Year: 2012
Identifying Phishing Threats in Government Web Services

Author(s): Yunsang Oh | Takashi Obi
Volume: 2
Issue: 1
Year: 2012
Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO)

Author(s): Arindam Sarkar | J. K. Mandal
Volume: 2
Issue: 1
Year: 2012
Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces

Author(s): Tyson Brooks | Lee McKnight
Volume: 2
Issue: 1
Year: 2012
Save time & money - Smart Internet Solutions      Why do you need a reservation system?