International Journal of Network Security & Its Applications (IJNSA)

Volume 2

October 2010, Volume 2, Number 4

A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features
Angel R. Otero1, Carlos E. Otero2 and Abrar Qureshi2, 1Nova Southeastern University, USA and 2University of Virginia's
College at Wise, USA
Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option FIeld:
A Characterization
Danilo Valeros Bernardo and Doan B Hoang, The University of Technology- Sydney, Australia
Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique
M. Kiran Kumar1, S. Mukthyar Azam1 and Shaik Rasool2, 1R.V.R & J.C College of Engg, India and 2S.C.E.T, India
Verification of Quantum Cryptography Protocols by Model Checking
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi1,3, 1FSO, University Mohamed Ist, Morocco, 2ESTO, University
Mohamed Ist, Morocco and 3Academy Hassan II of Sciences & Technology, Morocco
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks
Vivaksha Jariwala1 and D. C. Jinwala2, 1C. K. Pithawalla College of Engineering and Technology, India and 2S. V. National
Institute of Technology, India
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN
Mohammed A. Abuhelaleh and Khaled M. Elleithy, University Of Bridgeport, USA
Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless Sensor Network
Vikas Kumar1 and Rajender Kumar2, NIT- kurukshetra, India
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
Jaydip Sen, Tata Consultancy Services Ltd - Kolkata, India
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for
Multi-Server Environment
Rafael Martinez-Pelaez1,2, Francisco Rico-Novella1, Cristina Satizabal2 and Jacek Pomykala3, 1Technical University of
Catalonia, Spain, 2Universidad de la Sierra Sur, Mexico and 3Warsaw University, Poland
A (2,N) Visual Cryptographic Technique for Banking Applications
Jayanta Kumar Pal1, J. K. Mandal2 and Kousik Dasgupta1, 1Kalyani Government Engineering College, India and
2University of Kalyani, India
Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents
Mueen Uddin1, Kamran Khowaja2 and Azizah Abdul Rehman1, 1UTM, Malaysia and 2Isra University, Pakistan
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis, Kingston University
- London, United Kingdom
Lightweight C&C based botnet detection using Aho-Corasick NFA
Udhayan J1, Anitha R2 and Hamsapriya T2, 1Karunya University, India and 2PSG College of Technology, India
Emergency Response Communications and Associated Security Challenges
Muhammad Ibrahim Channa and Kazi M. Ahmed, Asian Institute of Technology, Thailand
A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN
Soumya Maity, P Bera, S K Ghosh and Pallab Dasgupta, Indian Institute of Technology - Kharagpur, India
Additional Papers
Effective Voice Calls Admission for Authorized User in Inter VOIP Network
Subashri T and Vaidehi V, Anna University - Chennai, India
ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan
Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing (C-DAC), India
Improving the Reliability of Detection of LSB Replacement Steganography
Shreelekshmi R1, Wilscy M2 and C E Veni Madhavan3, 1College of Engineering -Trivandrum, India, 2University of Kerala,
India and 3Indian Institute of Science, India
Zero Data Remnance Proof in Cloud Storage
Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India
Bayesian Based Comment Spam Defending Tool
Dhinaharan Nagamalai1, Beatrice Cynthia Dhinakaran2 and Jae Kwang Lee2, 1Wireilla Net Solutions, Australia and
2Hannam University, South Korea

July 2010, Volume 2, Number 3

A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords
Dhananjay Kulkarni, Boston University, USA.
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next Generation High Rate WPAN
Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of Electronics and Telecommunications of Rennes
(IETR),France.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Chang N. Zhang, Qian Yu and Xiao Wei Liu, University of Regina, Canada.
Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs
Theodore Zahariadis1, Helen Leligou1, Panagiotis Karkazis5,Panagiotis Trakadas2, Ioannis Papaefstathiou5,Charalambos
Vangelatos3 and Lionel Besson4, 1 Technological Educational Institute of Chalkis, Greece,2 Hellenic Authority for
Communications Security and Privacy (ADAE), Greece,3 Hellenic Aerospace Industry S.A., Greece,
4 Thales Communications, France and 5 Technical University of Crete, Greece.
Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics Timers
Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant, University of Mauritius.
Improving TLS Security By Quantum Cryptography
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi3, 1FSO, University Mohamed Ist, Morocco,2ESTO, University
Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco.
Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network
Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2, 1Stamford University ,Bangladesh and 2American
International University,Bangladesh.
Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network
S. Albert Raebra1 and S. Vijayalakshmi2, 1St.Josephs College, Bharathidasan University,India and 2Pondicherry University,
India
An Efficient IP Traceback Through Packet Marking Algorithm
Y.Bhavani and P.Niranjan Reddy,Kakatiya Institute of Technology and Science,India.
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained
Network Environment
K R Chandrasekhara Pillai1 and M P Sebastian2, 1N S S College of Engineering,India and 2Indian Institute of Management,
India
Wireless Security Measurement Using Data Value Index
Reza Amirpoor, 1Ajay Kumar 2 and Satish R. Deavne 3,1Bharati Vidyapeeth University,India,2JSPMs JAYAWANT Institute of
Computer Applications,India and 3DR.D. Y. Patil Ramrao Adik Institute of Technology,India.
An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error Concealment
Amit Phadikar1 and Santi P. Maity 2, 1MCKV Institute of Engineering,India and 2Bengal Engineering and Science University,
India
Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services
Urjita Thakar1, Nirmal Dagdee2 and Sudarshan Varma3, 1Shri G.S. Institute of Technology and Science,India,2S.D. Bansal
College of Technology,India and 3Ideavate Solutions, USA.

April 2010, Volume 2, Number 2

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology, Guwahati, India
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
Dewan Md. Farid1, Nouria Harbi1, and Mohammad Zahidur Rahman2, 1University Lumiere Lyon 2 - France and
2Jahangirnagar University, Bangladesh
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, EGYPT
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
S.Sangeetha1 & V.Vaidehi2, 1Angel College of Engineering, India and 2Madras Institute of Technology, India
Events Classification in Log Audit
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait
Analysis of the Security of BB84 by Model Checking
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi13, 1FSO, University Mohamed Ist, Morocco, 2ESTO, University
Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor
Mohsen Machhout1, Zied Guitouni1, Kholdoun Torki2, Lazhar Khriji3 and Rached Tourki1, 1Faculty of Sciences of Monastir,
Tunisia,2TIMA - CMP Laboratory, France and 3Sultane Qaboos University, Oman
Impersonation Attack on EKE Protocol
Shirisha Tallapally , Vaagdevi College of Engineering, India
A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy
-Constrained Devices
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore
Trust Based Content Distribution for Peer-To-Peer Overlay Networks
S.Ayyasamy1 and S.N. Sivanandam2, 1Tamilnadu College of Engineering, India and 2PSG College of Technology, India
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET
T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology, Sathyamangalam,India
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France

January 2010, Volume 2, Number 1

Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks
James Cannady, Nova Southeastern University, USA
A Frame Work for Ontological Privacy Preserved Mining
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch, VIT University, India.
Workload Characterization of Spam Email Filtering Systems
Yan Luo, University of Massachusetts Lowell, USA
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA
Weakness on Cryptographic Schemes Based on Regular LDPC Codes
Omessaad Hamdi1 , Manel abdelhedi2, Ammar Bouallegue2 and Sami Harari3, 1SYSTEL, SUPCOM, Tunisia, 2SYSCOM, ENIT,
Tunisia and 3SIS, USTV, France.
Advanced Security Management in Metro Ethernet Networks
Ammar Rayes, Cisco Systems, USA
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic
Institution Application
1Syed S. Rizvi, 2Aasia Riasat and 3Khaled M. Elleithy,1, 3University of Bridgeport, USA and 2Institute of Business
Management, Pakistan.
Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon