5 |
A real time detection of Distributed Denial-of-Service attacks using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System
Anitha R, Karthik R, Pravin V and Thirugnanam K, PSG College of Technology, India |
35 |
Implementing Availability State Transition Model to Quantify Risk Factor
Shalini Chandra and Raees Ahmad Khan, BBA University, India. |
49 |
On the Security of Two Certi_cateless Signature Schemes
Young-Ran Lee, National Institute for Mathematical Sciences, Korea |
58 |
Information Security using Chains Matrix Multiplication
Ch. Rupa1 and P. S Avadhani2, 1 VVIT, India and 2 Andhra University, India |
60 |
Formal Security Verification of ECC Based Signcryption Scheme
Atanu Basu1, Indranil Sengupta1 and Jamuna Kanta Sing2, 1 Indian Institute of Technology, India and 2 Jadavpur University, India |
66 |
Universal Steganalysis using Contourlet Transform
V.Natarajan, R.Anitha, PSG College of Technology, India |
78 |
Proposed Clustering Algorithm with Intrusion Detection Using K - Means (modified) & Hashed K - Means Algorithms
M. Varaprasad Rao1, A. Damodaram2 and N Ch Bharta Charyulu3, 1Matrusri Institute of PG Studies, 2JNTU College of Engineering, Hydearabad and 3Osmania University |
99 |
Z Transform based Digital Image Authentication using Quantization Index Modulation (Z-DIAQIM)
Nabin Ghoshal1, Soumit Chowdhury2 and Jyotsna Kumar Mandal1, 1 University of Kalyani,India and 2Govt. College of Engineering & Ceramic Technology, India |
100 |
Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)
Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2 University of Kalyani, India |
101 |
A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA)
J. K. Mandal and S. K.Ghosal, Kalyani University, India |
109 |
Securing Systems after Deployment David Neal1 and Shawon Rahman2, 1Capella University, USA and 2University of Hawaii-Hilo, USA
|
138 |
Encryption of Images based on Genetic algorithm - A New Approach
Jalesh kumar and S. Nirmala, J.N.N.C.E., India |
140 |
Content Based Image Retrieval Using Normalization of Vector Approach to SVM
Sumit Dhariwal, Sandeep Raghuwanshi, and Shailendra Shrivastava, SATI vidisha, India |
145 |
Modified Grøstl: An Efficient Hash Function
Gurpreet Kaur1, Vidyavati S Nayak1, Dhananjoy Dey2, S K Pal2, 1Defence Institute of Advance Technology, India and 2 Scientific Analysis Group, India |
166 |
Fast DOA estimation using wavelet denoising on MIMO fading channel
A.V. Meenakshi , V.Punitham, R.Kayalvizhi and S.Asha, Periyar Maniammai University, India |
208 |
Iris recognition systems with reduced storage and high accuracy using Majority Voting and Haar Transform
V.Anitha, R.Leela Velusamy, National Institute of Technology, India |
209 |
Recovery of Live Evidence from Internet Applications
Ipsita Mohanty, R. Leela Velusamy, National Institute of Technology, India |
210 |
Face Detection Using HMM -SVM Method
Nupur Rajput, Pranita Jain and Shailendra Shrivastava, Smrat Ashok Technological Institute, India |
216 |
High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain
Sunita V. Dhavale, R. S. Deodhar and L. M. Patnaik, Defence Institute of Advanced Technology, India |
226 |
Key Management Protocol in WIMAX revisited
Noudjoud Kahya1, Nacira Ghoualmi1 and Pascal Lafourcade2, 1Badji Mokhtar University, Algeria and 2Joseph Fourier University, France |
231 |
Image Authentication Technique based on DCT (IATDCT
Nabin Ghosal1, Anirban Goswami2, Jyotsna Kumar Mondal1 and Dipankar Pal2, 1 University of Kalyani, India and 2Techno India -Kolkata, India |
233 |
A Co-operative Multi-agent Based Wireless Intrusion Detection System Using MIBs
Ashvini Vyavhare,Varsharani Bhosale,Mrunal Sawant and Fazila Girkar, College of Engineering - Pune, India |
248 |
A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks
Charles A. Kamhoua1, Kevin A. KwiatM1, and Joon S. Park2, 1Air Force Research Laboratory, USA and 2Syracuse University, USA |
262 |
A Novel way of protecting the shared key by using secret sharing and embedding using pseudo random numbers
P Devaki and G Raghavendra Rao, National Institute of Engineering India |
264 |
Security Assurance by Efficient Non-Repudiation Requirements
S. K. Pandey1 and K. Mustafa2, 1The Institute of Chartered Accountants of Noida and 2Jamia Millia Islamia (A Central University), India |
267 |
Poor Quality Watermark Barcodes Image Enhancement
Mohammed A.Atiea, Yousef B.Mahdy and Abdel-Rahman Hedar, Assiut University, Egypt |
268 |
Hiding Data in FLV Video File
Mohammed A.Atiea , Yousef B.Mahdy, Abdel-Rahman Hedar, Assiut University, Egypt |
273 |
Network Layer Attacks Classification and WFJBA ID Technique in Wireless Mesh Network
K. Ganesh Reddy and P. Santhi Thilagam, NITK Surathkal, India |