Improved Trial Division Technique for Primality Checking in RSA Algorithm
Author(s): Kumarjit Banerjee | Satyendra Nath Mandal | Sanjoy Kumar Das
Volume: 5
Issue: 9
Year: 2013




Method and System for Protection of Automated Control Systems for “Smart Buildings”
Author(s): Dmitry Mikhaylov | Igor Zhukov | Andrey Starikovskiy | Alexander Zuykov | Anastasia Tolstaya | Maxim Fomin
Volume: 5
Issue: 9
Year: 2013




Analysis of Reconfigurable Processors Using Petri Net
Author(s): Hadis Heidari
Volume: 5
Issue: 9
Year: 2013




A Genetic Algorithm Inspired Load Balancing Protocol for Congestion Control in Wireless Sensor Networks using Trust Based Routing Framework (GACCTR)
Author(s): Arnab Raha | Mrinal Kanti Naskar | Avishek Paul | Arpita Chakraborty | Anupam Karmakar
Volume: 5
Issue: 9
Year: 2013




Mobile Localization Based on Clustering
Author(s): Malika BELKADI | Rachida AOUDJIT | Mehammed DAOUI | Mustapha LALAM
Volume: 5
Issue: 9
Year: 2013




Improved Trial Division Technique for Primality Checking in RSA Algorithm
Author(s): Kumarjit Banerjee | Satyendra Nath Mandal | Sanjoy Kumar Das
Volume: 5
Issue: 9
Year: 2012




Sectorized Hamming Concentric Circular Arrays for Stratospheric Platforms Cellular Design
Author(s): Yasser Albagory
Volume: 5
Issue: 9
Year: 2013




Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation
Author(s): Awadhesh Kumar | Prabhat Singh | Vinay Kumar | Neeraj Tyagi
Volume: 5
Issue: 9
Year: 2013




Video Forensics in Temporal Domain using Machine Learning Techniques
Author(s): Sunil Jaiswal | Sunita Dhavale
Volume: 5
Issue: 9
Year: 2013




Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers
Author(s): M. Milton Joe | R.S. Shaji | K. Ashok Kumar
Volume: 5
Issue: 8
Year: 2013




Information Leakage Prevention Using Virtual Disk Drive
Author(s): Tarek S. Sobh
Volume: 5
Issue: 8
Year: 2013




MUSIC 2D-DOA Estimation using Split Vertical Linear and Circular Arrays
Author(s): Yasser Albagory | Amira Ashour
Volume: 5
Issue: 8
Year: 2013




Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP
Author(s): Mehajabeen Fatima | Roopam Gupta | T.K.Bandhopadhyay
Volume: 5
Issue: 8
Year: 2013




A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer
Author(s): Maria Sebastian | Arun Raj Kumar P.
Volume: 5
Issue: 8
Year: 2013




GSM Base Stations Location Monitoring using Geographic Information System
Author(s): Kuboye B. M. | Dada O. A. | Akinwonmi F. C.
Volume: 5
Issue: 8
Year: 2013




Analysis of the SYN Flood DoS Attack
Author(s): Mitko Bogdanoski | Tomislav Shuminoski | Aleksandar Risteski
Volume: 5
Issue: 8
Year: 2013




Geographic Load Balanced Routing in Wireless Sensor Networks
Author(s): Robin Guleria | Ankit Kumar Jain
Volume: 5
Issue: 8
Year: 2013




Flat-Top Ring-Shaped Cell Design for High-Altitude Platform Communications
Author(s): Yasser Albagory
Volume: 5
Issue: 7
Year: 2013




Image Encryption based on the RGB PIXEL Transposition and Shuffling
Author(s): Quist Aphetsi Kester
Volume: 5
Issue: 7
Year: 2013




A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks
Author(s): Rafi U Zaman | Khaleel ur Rahman Khan | A.Venugopal Reddy
Volume: 5
Issue: 7
Year: 2013




A New Proposal for Route Finding in Mobile AdHoc Networks
Author(s): H.Vignesh Ramamoorthy | D.Suganya Devi
Volume: 5
Issue: 7
Year: 2013




Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey
Author(s): Joyce Jose | M. Princy | Josna Jose
Volume: 5
Issue: 7
Year: 2013




A Secure and Robust Image Encryption Scheme Based on Mixture of Multiple Generalized Bernoulli Shift Maps and Arnold Maps
Author(s): Ruisong Ye | Yuanlin Ma
Volume: 5
Issue: 7
Year: 2013




Wi-Fi Networks Security and Accessing Control
Author(s): Tarek S. Sobh
Volume: 5
Issue: 7
Year: 2013




Adaptive Population Sizing Genetic Algorithm Assisted Maximum Likelihood Detection of OFDM Symbols in the Presence of Nonlinear Distortions
Author(s): K. Seshadri Sastry | M.S.Prasad Babu
Volume: 5
Issue: 7
Year: 2013




Social Networking for Botnet Command and Control
Author(s): Ashutosh Singh | Annie H. Toderici | Kevin Ross | Mark Stamp
Volume: 5
Issue: 6
Year: 2013




Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques
Author(s): Sultan Aljahdali
Volume: 5
Issue: 6
Year: 2013




A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks
Author(s): S. M. Chadchan | C. B. Akki
Volume: 5
Issue: 6
Year: 2013




Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure
Author(s): Ritu Garg | Awadhesh Kumar Singh
Volume: 5
Issue: 6
Year: 2013




Password Hardened Biometric: A Complete Solution of Online Security
Author(s): Ajay Sharma | Deo Brat Ojha
Volume: 5
Issue: 6
Year: 2013




Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network
Author(s): Smita Parija | Santosh Kumar Nanda | Prasanna Kumar Sahu | Sudhansu Sekhar Singh
Volume: 5
Issue: 6
Year: 2013




A Robust Fault Detection Scheme for the Advanced Encryption Standard
Author(s): Hassen Mestiri | Noura Benhadjyoussef | Mohsen Machhout | Rached Tourki
Volume: 5
Issue: 6
Year: 2013




Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers
Author(s): P. Mabin Joseph | J. Rajan | K.K. Kuriakose | S.A.V. Satya Murty
Volume: 5
Issue: 6
Year: 2013




A Bespoke Technique for Secret Messaging
Author(s): Mahimn Pandya | Hiren Joshi | Ashish Jani
Volume: 5
Issue: 5
Year: 2013




Criteria Specifications for the Comparison and Evaluation of Access Control Models
Author(s): Shabnam Mohammad Hasani | Nasser Modiri
Volume: 5
Issue: 5
Year: 2013




Effect of Black Hole Attack on MANET Routing Protocols
Author(s): Jaspal Kumar | M. Kulkarni | Daya Gupta
Volume: 5
Issue: 5
Year: 2013




Biometric Passport Validation Scheme using Radio Frequency Identification
Author(s): V.K. Narendira Kumar | B. Srinivasan
Volume: 5
Issue: 5
Year: 2013




Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System
Author(s): G.Velmayil | S.Pannirselvam
Volume: 5
Issue: 5
Year: 2013




The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity
Author(s): Shafi’í Muhammad Abdulhamid | Olawale Surajudeen Adebayo | Damian Oshomah Ugiomoh | Mohammed Danlami AbdulMalik
Volume: 5
Issue: 5
Year: 2013




Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals
Author(s): Zhukov Igor | Mikhaylov Dmitry | Starikovskiy Andrey | Kuznetsov Dmitry | Tolstaya Anastasia | Zuykov Alexander
Volume: 5
Issue: 5
Year: 2013




Recent Replica Placement Algorithms in P2P Networks – A Review
Author(s): Kala Karun. A | Jayasudha. J. S
Volume: 5
Issue: 5
Year: 2013




QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks
Author(s): Sanjay Kumar | Mayank Dave | Surender Dahiya
Volume: 5
Issue: 4
Year: 2013




Optimizing the CMTS to Improve Quality of Service in Next Generation Networks based on ACO Algorithm
Author(s): Dac-Nhuong Le
Volume: 5
Issue: 4
Year: 2013




Formal Verification of Congestion Control Algorithm in VANETs
Author(s): Mohamad Yusof Darus | Kamalrulnizam Abu Bakar
Volume: 5
Issue: 4
Year: 2013




A Novel Routing Scheme for Mobile Ad Hoc Network
Author(s): Prem Chand | M.K.Soni
Volume: 5
Issue: 4
Year: 2013




Omni Directional Antenna Assisted Scheme to Minimize Redundancy in Wireless Sensor Networks
Author(s): Tarun Dubey | O.P. Sahu
Volume: 5
Issue: 4
Year: 2013




3-Level Heterogeneity Model for Wireless Sensor Networks
Author(s): Satish Chand | Samayveer Singh | Bijendra Kumar
Volume: 5
Issue: 4
Year: 2013




A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks
Author(s): CH. V. Raghavendran | G. Naga Satish | P. Suresh Varma
Volume: 5
Issue: 4
Year: 2013




Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
Author(s): Alawi A. Al-Saggaf | Haridas Acharya
Volume: 5
Issue: 4
Year: 2013




Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks
Author(s): Ibrahim S. I. Abuhaiba | Huda B. Hubboub
Volume: 5
Issue: 3
Year: 2013



