Integrating Identity-Based Cryptography in IMS Service Authentication Mohamed Abid1, Songbo Song2, Hassnaa Moustafa2 and Hossam Afifi1,1Telecom & Management SudParis ,Evry, France
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT University,INDIA.
Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication Scheme Mohammed Aijaz Ahmed1, D. Rajya Lakshmi2 and Sayed Abdul Sattar3 GITAM University, India
Psim: A Tool for Analysis of Device Pairing Methods Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK
Data Security in Mobile Devices by GEO Locking
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India
Performance Evaluation of a New Route Optimization Technique for Mobile IP Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia University, Egypt
Security Properties in an Open Peer-to-Peer Network Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire DInformatique Fondamentale DOrleans, Universite DOrleans, Ensi de Bourges, France
A Security Framework for SOA Applications in Mobile Environment Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos portugueses, Campus do Bacanga, Sao Luis, Brazil
Securing AODV for MANETs using Message Digest with Secret Key
Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute of Technology & Science, India
Application Specific Usage control Implementation Verification
Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta
Indian Institute of Technology-Kharagpur, India
Iterative method for improvement of coding and decryption Natasa Zivic,
Institute for Data Communication Systems, University of Siegen,Germany
A new key establishment Scheme for wireless sensor networks Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu,
Department of Computer Science, The University of Hong Kong, Hong Kong
Dynamic IDP signature processing by fast elimination using DFA Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer Networks & Internet Engineering Division, Centre for Development of Advanced Computing,Bangalore, India
Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless packet networks G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of Technology,Tamilnadu, India
Clustered Hierarchy in Sensor Networks: Performance and Security Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar,
School of Engineering, University of Bridgeport
USA
Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States Yoshito Kanamori 1 and Seong-Moo Yoo 2,
1 University of Alaska Anchorage, Alaska, USA,
2 The University of Alabama in Huntsville, Alabama, USA
Intelligent Intrusion Detection System Framework Using Mobile Agents N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT University, India
On Generation of Firewall Log Status Reporter (SRr) Using Perl Sugam Sharma1, Hari Cohly2, and Tzusheng Pei2,
1 Iowa State University, USA, 2Jackson State University, USA
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and Technology (NIST), USA
Using Rough Set and Support Vector Machine for Network Intrusion Detection Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of Technology,Taiwan, R.O.C
Tools and Techniques for Network Forensics Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State University,USA
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering & Technology, India
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard Algorithm Poonam Garg,Institute of Management Technology, India
A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of Engineering and Management, India,
West Bengal University of Technology,India, University of Calcutta,India