Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication

Author(s): AAmir Shahzad | Shahrulniza Musa
Volume: 6
Issue: 3
Year: 2012





Blinded Montgomery Powering Ladder Protected Against the Jacobi Symbol Attack

Author(s): David Tinoco Varela
Volume: 6
Issue: 3
Year: 2012





Low Power Elliptic Curve Digital Signature Design for Constrained Devices

Author(s): Elhadjyoussef Wajih | Benhadjyoussef Noura | Machhout Mohsen | Tourki Rached
Volume: 6
Issue: 2
Year: 2012





A Novel Approach for Image Steganography in Spatial Domain Using Last Two Bits of Pixel Value

Author(s): A Novel Approach for Image Steganography in Spatial Domain Using Last Two Bits of Pixel Value
Volume: 5
Issue: 2
Year: 2011





Smart Card Security; Technology and Adoption

Author(s): Hamed Taherdoost | Shamsul Sahibuddin | Neda Jalaliyoon
Volume: 5
Issue: 2
Year: 2011





A Spectral Domain Local Feature Extraction Algorithm for Face Recognition

Author(s): Shaikh Anowarul Fattah, Hafiz Imtiaz
Volume: 5
Issue: 2
Year: 2011





Medical Information Security

Author(s): William C. Figg, Ph.D. | Hwee Joo Kam, M.S.
Volume: 5
Issue: 1
Year: 2011





A New Watermarking Approach Based on Combination of Reversible Watermarking and CDMA in Spatial and DWT Domain

Author(s): S.Bekkouche & A.Chouarfia
Volume: 5
Issue: 1
Year: 2011





An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobile Networks

Author(s): Mustafa AL-Fayoumi | Ja’afer AL-Saraireh
Volume: 5
Issue: 1
Year: 2011





An Exploratory Study of the Security Management Practices of Hispanic Students

Author(s): Yi-Chia Wu | Francis Kofi Andoh-Baidoo | Robert Crossler | Jesus Tanguma
Volume: 5
Issue: 1
Year: 2011





Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment

Author(s): Iyad Aldasouqi | Walid Salameh
Volume: 4
Issue: 5
Year: 2010





Protection of Patient Identity and Privacy Using Vascular Biometrics

Author(s): C.Lakshmi Deepika | A.Kandaswamy | C.Vimal
Volume: 4
Issue: 5
Year: 2010





Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operations using Multiple Parallel Multipliers
Author(s): Adnan Abdul-Aziz Gutub
Volume: 4
Issue: 4
Year: 2010




A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
Author(s): Omid Mahdi Ebadati E. | Harleen Kaur | M. Afshar Alam
Volume: 4
Issue: 4
Year: 2010




Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks

Author(s): J.Samuel Manoharan, Dr.Kezi C.Vijila & A.Sathesh
Volume: 4
Issue: 3
Year: 2010





TUX-TMS: Thapar University Extensible-Trust Management System
Author(s): Shashi Bhanwar | Seema Bawa
Volume: 4
Issue: 1
Year: 2010




Secure Group Communication in Grid Environment

Author(s): Dr Sudha Sadasivam G, Ruckmani V & Anitha Kumari K
Volume: 4
Issue: 1
Year: 2010





A Secure Communication Model for Voting Application Using Multiple Mobile Agents

Author(s): D.S.Adane | S.R.Sathe
Volume: 4
Issue: 1
Year: 2010





A Secure Communication Model for Voting Application Using Multiple Mobile Agents

Author(s): E. A. Mary Anita | V. Vasudevan
Volume: 3
Issue: 6
Year: 2009





Criminal and Civil Identification with DNA Databases Using Bayesian Networks

Author(s): Marina Andrade | Manuel Alberto M. Ferreira
Volume: 3
Issue: 4
Year: 2009





Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids

Author(s): Ajay Prasad | Saurabh Singh Verma | Ashok Kumar Sharma
Volume: 3
Issue: 4
Year: 2009





Performance Evaluation and Comparison of On Demand Multicast Reactive Routing Protocols under Black Hole Attack in MANET
Author(s): Mary Anita. E.A | V. Vasudevan
Volume: 3
Issue: 4
Year: 2009




Evaluation of Potential Manufacturing Suppliers Using Analytical Hierarchy Process and Cluster Analysis for Benchmarking

Author(s): A. Adnan | A. Cazan | M. Safa | A.W.M Lung | G. Williams
Volume: 3
Issue: 3
Year: 2009





Techniques in Computer Forensics: A Recovery Perspective

Author(s): Bhanu Prakash Battula | B. Kezia Rani | R. Satya Prasad | T. Sudha
Volume: 3
Issue: 2
Year: 2009





A Trust Conscious Secure Route Data Communication in MANETS

Author(s): Dr. Anil Kapil | Mr. Rajneesh Gujral
Volume: 3
Issue: 1
Year: 2009





Identity-Based Key Management in MANETs using Public Key Cryptography

Author(s): Dr. Anil Kapil | Mr. Sanjeev Rana
Volume: 3
Issue: 1
Year: 2009





Separation of Duty and Context Constraints For Contextual Role-Based Access Control (C-RBAC)
Author(s): Muhammad Nabeel Tahir
Volume: 3
Issue: 1
Year: 2009




Biometrics Security using Steganography

Author(s): Chander Kant | Rajender Nath | Sheetal Chaudhary
Volume: 2
Issue: 1
Year: 2008





Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm

Author(s): Bibhudendra Acharya | Girija Sankar Rath | Sarat Kumar Patra | Saroj Kumar Panigrahy
Volume: 1
Issue: 1
Year: 2007





Multi-Dimensional Privacy Protection for Digital Collaborations

Author(s): Geoff Skinner
Volume: 1
Issue: 1
Year: 2007





MODIFIED APPROACH FOR SECURING REAL TIME APPLICATION ON CLUSTERS

Author(s): Abhishek Songra | Rama Shankar Yadav | Sarsij Tripathi
Volume: 1
Issue: 1
Year: 2007





Performance Analysis of Mobile Security Protocols: Encryption and Authentication

Author(s): Anita Singhrova | Dr. Nupur Prakash
Volume: 1
Issue: 1
Year: 2007




