International Journal of Network Security & Its Applications (IJNSA)

Volume 1

October 2009, Volume 1, Number 3

Integrating Identity-Based Cryptography in IMS Service Authentication
Mohamed Abid1, Songbo Song2, Hassnaa Moustafa2 and Hossam Afifi1,1Telecom & Management SudParis ,Evry, France
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT University,INDIA.
Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication Scheme
Mohammed Aijaz Ahmed1, D. Rajya Lakshmi2 and Sayed Abdul Sattar3 GITAM University, India
Psim: A Tool for Analysis of Device Pairing Methods
Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK
Data Security in Mobile Devices by GEO Locking
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India
Performance Evaluation of a New Route Optimization Technique for Mobile IP
Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia University, Egypt
Security Properties in an Open Peer-to-Peer Network
Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire DInformatique Fondamentale DOrleans, Universite
DOrleans, Ensi de Bourges, France
A Security Framework for SOA Applications in Mobile Environment
Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos portugueses, Campus do Bacanga, Sao Luis, Brazil
Securing AODV for MANETs using Message Digest with Secret Key
Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute of Technology & Science, India
Application Specific Usage control Implementation Verification
Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta Indian Institute of Technology-Kharagpur, India

July 2009, Volume 1, Number 2

Iterative method for improvement of coding and decryption
Natasa Zivic, Institute for Data Communication Systems, University of Siegen,Germany
Tools A new key establishment Scheme for wireless sensor networks
Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, Department of Computer Science, The University of Hong Kong, Hong Kong
Dynamic IDP signature processing by fast elimination using DFA
Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer Networks & Internet Engineering
Division, Centre for Development of Advanced Computing,Bangalore, India
Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless packet networks
G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of Technology,Tamilnadu, India
Clustered Hierarchy in Sensor Networks: Performance and Security
Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar, School of Engineering, University of Bridgeport USA
Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States
Yoshito Kanamori 1 and Seong-Moo Yoo 2, 1 University of Alaska Anchorage, Alaska, USA, 2 The University of Alabama
in Huntsville, Alabama, USA
Intelligent Intrusion Detection System Framework Using Mobile Agents
N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT University, India
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Sugam Sharma1, Hari Cohly2, and Tzusheng Pei2, 1 Iowa State University, USA, 2Jackson State University, USA
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and Technology (NIST), USA

April 2009, Volume 1, Number 1

Using Rough Set and Support Vector Machine for Network Intrusion Detection
Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of Technology,Taiwan, R.O.C
Tools and Techniques for Network Forensics
Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State University,USA
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering & Technology, India
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption
Standard Algorithm
Poonam Garg,Institute of Management Technology, India
A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks
Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of Engineering and Management, India,
West Bengal University of Technology,India, University of Calcutta,India