Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment
Alexander Beck, Jens Graupmann and Frank Ortmeier, Otto-von-Guericke-University, Germany
New Digital Signature Protocol Based on Elliptic Curves
Ounasser Abid, Jaouad Ettanfouhi and Omar Khadir, University of Hassan II Mohammedia-Casablanca, Morocco
On the Cryptographic Measures and Chaotic Dynamical Complexity Measures
Hanping Hu, LingFeng Liu, Huazhong University of Science &Technology, China
Rectified Differential Cryptanalysis of 16 Round Present
Manoj Kumar, Pratibha Yadav and Meena Kumari, SAG, DRDO,India
Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption
S G Srikantaswamy and H D Phaneendra, National Institute of Engineering, Mysore,India
Authentication Schemes Using Polynomials Over Non-Commutative Rings
Maheswara Rao Valluri, Fiji National University, Fiji
An Improved Certified E Mail Protocol Based on Author Based Selective Receipt
Ranadeep Mukherjee and Ambar Dutta, Birla Institute of Technology,India
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm
S. Fouzul Hidhaya and Angelina Geetha, B.S. Abdur Rahman University, India
Video Surveillance in the Cloud?
DJ Neal and Syed (Shawon) Rahman, Capella University, USA
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocols and Biometrics Technology
V.K. Narendira Kumar and B. Srinivasan, Gobi Arts & Science College (Autonomous), India
Language-Based Security to Apply Computer Security
Ali Ahmadian Ramaki and Reza Ebrahimi Atani, Guilan University, Iran
Tripartite Key Agreement Protocol using Triple Decomposition Search Problem
T.Isaiyarasi1,K.Sankarasubramanian2, 1Valliammai Engineering College,India and 2Sri Sairam Engineering College, India
Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems
Vinay S. Iyengar, Oregon Episcopal School, USA
Enhancing Security of Quality Song with Embedding Encrypted Hidden Code in
Tolerance Level (SQHTL)
Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2University of Kalyani,India
Blind Image Steganalysis Based on Contourlet Transform
Natarajan V and R Anitha, PSG College of Technology,India
A Defense Mechanism for Credit Card Fraud Detection
M.Sasirekha, Sumaiya Thaseen .I and Saira Banu.J, VIT University,India
A Novel Approach for Cryptography Technique on Perturbed Data for Distributed Environment
Nishant Doshi, National Institute of Technology, India
A Secure Encryption Logic for Communication in Wireless Sensor Networks
Shanta Mandal and Rituparna Chaki, West Bengal University of ,India
Architectural Optimization of AES Transformations and Keyexpansion
K. Rahimunnisa1, M. Priya Zach1, S. Suresh Kumar2, J.Jayakumar2, 1Karunya University,India, 2Dr. N.G.P Institute of Technology,India
Image Encryption Using Fibonacci-Lucas Transformation
Minati Mishra1, Priyadarsini Mishra2, M.C. Adhikary1 and Sunit Kumar3, 1F.M. University, India, 2District Rural Development Agency, India and 3Kolhan University, India
Performance of Error Filters in Halftone Visual Cryptography
Anshul Sharma, Chandigarh University, India
Secure Data Transmission Using Steganography and Encryption Technique
Shamim Ahmed Laskar and Kattamanchi Hemachandran, Assam University, India
ECG Based Human Authentication using Wavelets and Random Forests
Noureddine Belgacem1, Amine Nait-Ali2, Regis Fournier2 and Fethi Bereksi-Reguig1, 1Abou Bekr Belkaid University, Algeria and 2UPEC University, France.
Implementation of a New Methodology to Reduce the Effects of Changes of Illumination in Face Recognition-based Authentication
Andres Alarcon-Ramirez and Mohamed F. Chouikha, Howard University, Washington DC
Implementation and Analysis of Homomorphic Encryption Schemes
Nitin Jain1, Saibal K. Pal2 and Dhananjay K. Upadhyay2, 1Guru Gobind Singh Indraprastha University, India. 2DRDO, Metcalfe House Complex, India
A Hybrid Approach to Counter Application Layer DDOS Attacks S. Renuka Devi and P. Yogesh, AnnaUniversity, India
Mitigating Strategy to Shield the VPN Service from DoS Attack S.Saraswathi and P.Yogesh, Anna University-Chennai, India
Cryptanalyzing of Message Digest Algorithms MD4 and MD5
Md. Alam Hossain, Md. Kamrul Islam, Subrata Kumar Das and Md. Asif Nashiry, Jessore Science & Technology University Bangladesh.
Avoiding Wormhole Attack in MANET using Statistical Analysis Approach
Saurabh Upadhyay1 and Aruna Bajpai2,1Sarvottam Institute of technology and Management, Greater Noida, India and 2Samrat Ashok Technological Institute-Vidisha, India.
Enhancing the Network Security Using Amalgam Games
T.P.Anithaashri and R.Baskaran, Anna University-Chennai, India
Chaos Based Mixed Keystream Generation for Voice Data Encryption
Musheer Ahmad1, Bashir Alam1 and Omar Farooq2, 1Jamia Millia Islamia, India and 2ZH College of Engineering and Technology, India
Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping
Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa B, National Institute of Technology Karnataka, Surathkal
Robust Speech Coding Algorithm
Akella Amarendra Babu1 and Ramadevi Yellasiri2, 1Progressive Engineering College, India and 2Chaitanya Bharathi Institute of Technology, India