International Journal on Cryptography and Information Security (IJCIS)

Volume 2

December 2012, Volume 2, Number 4

Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment  
Alexander Beck, Jens Graupmann and Frank Ortmeier, Otto-von-Guericke-University, Germany
New Digital Signature Protocol Based on Elliptic Curves  
Ounasser Abid, Jaouad Ettanfouhi and Omar Khadir, University of Hassan II Mohammedia-Casablanca, Morocco
On the Cryptographic Measures and Chaotic Dynamical Complexity Measures  
Hanping Hu, LingFeng Liu, Huazhong University of Science &Technology, China
Rectified Differential Cryptanalysis of 16 Round Present  
Manoj Kumar, Pratibha Yadav and Meena Kumari, SAG, DRDO,India
Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption  
S G Srikantaswamy and H D Phaneendra, National Institute of Engineering, Mysore,India
Authentication Schemes Using Polynomials Over Non-Commutative Rings  
Maheswara Rao Valluri, Fiji National University, Fiji
An Improved Certified E Mail Protocol Based on Author Based Selective Receipt  
Ranadeep Mukherjee and Ambar Dutta, Birla Institute of Technology,India
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm  
S. Fouzul Hidhaya and Angelina Geetha, B.S. Abdur Rahman University, India

September 2012, Volume 2, Number 3

Video Surveillance in the Cloud?  
DJ Neal and Syed (Shawon) Rahman, Capella University, USA
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocols and Biometrics Technology  
V.K. Narendira Kumar and B. Srinivasan, Gobi Arts & Science College (Autonomous), India
Language-Based Security to Apply Computer Security  
Ali Ahmadian Ramaki and Reza Ebrahimi Atani, Guilan University, Iran
Tripartite Key Agreement Protocol using Triple Decomposition Search Problem  
T.Isaiyarasi1,K.Sankarasubramanian2, 1Valliammai Engineering College,India and 2Sri Sairam Engineering College,
India
Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems  
Vinay S. Iyengar, Oregon Episcopal School, USA
Enhancing Security of Quality Song with Embedding Encrypted Hidden Code in Tolerance Level (SQHTL)  
Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2University of Kalyani,India
Blind Image Steganalysis Based on Contourlet Transform  
Natarajan V and R Anitha, PSG College of Technology,India
A Defense Mechanism for Credit Card Fraud Detection  
M.Sasirekha, Sumaiya Thaseen .I and Saira Banu.J, VIT University,India
A Novel Approach for Cryptography Technique on Perturbed Data for Distributed Environment  
Nishant Doshi, National Institute of Technology, India
A Secure Encryption Logic for Communication in Wireless Sensor Networks  
Shanta Mandal and Rituparna Chaki, West Bengal University of ,India
Architectural Optimization of AES Transformations and Keyexpansion  
K. Rahimunnisa1, M. Priya Zach1, S. Suresh Kumar2, J.Jayakumar2, 1Karunya University,India, 2Dr. N.G.P Institute of Technology,India
Image Encryption Using Fibonacci-Lucas Transformation   
Minati Mishra1, Priyadarsini Mishra2, M.C. Adhikary1 and Sunit Kumar3, 1F.M. University, India, 2District Rural
Development Agency, India and 3Kolhan University, India
Performance of Error Filters in Halftone Visual Cryptography  
Anshul Sharma, Chandigarh University, India
Secure Data Transmission Using Steganography and Encryption Technique  
Shamim Ahmed Laskar and Kattamanchi Hemachandran, Assam University, India

June 2012, Volume 2, Number 2

ECG Based Human Authentication using Wavelets and Random Forests  
Noureddine Belgacem1, Amine Nait-Ali2, Regis Fournier2 and Fethi Bereksi-Reguig1, 1Abou Bekr Belkaid University,
Algeria and 2UPEC University, France.
Implementation of a New Methodology to Reduce the Effects of Changes of Illumination in Face Recognition-based Authentication  
Andres Alarcon-Ramirez and Mohamed F. Chouikha, Howard University, Washington DC
Implementation and Analysis of Homomorphic Encryption Schemes  
Nitin Jain1, Saibal K. Pal2 and Dhananjay K. Upadhyay2, 1Guru Gobind Singh Indraprastha University, India.
2DRDO, Metcalfe House Complex, India
A Hybrid Approach to Counter Application Layer DDOS Attacks  
S. Renuka Devi and P. Yogesh, AnnaUniversity, India
Mitigating Strategy to Shield the VPN Service from DoS Attack  
S.Saraswathi and P.Yogesh, Anna University-Chennai, India

March 2012, Volume 2, Number 1

Cryptanalyzing of Message Digest Algorithms MD4 and MD5  
Md. Alam Hossain, Md. Kamrul Islam, Subrata Kumar Das and Md. Asif Nashiry, Jessore Science & Technology
University Bangladesh.
Avoiding Wormhole Attack in MANET using Statistical Analysis Approach  
Saurabh Upadhyay1 and Aruna Bajpai2,1Sarvottam Institute of technology and Management, Greater Noida, India
and 2Samrat Ashok Technological Institute-Vidisha, India.
Enhancing the Network Security Using Amalgam Games  
T.P.Anithaashri and R.Baskaran, Anna University-Chennai, India
Chaos Based Mixed Keystream Generation for Voice Data Encryption  
Musheer Ahmad1, Bashir Alam1 and Omar Farooq2, 1Jamia Millia Islamia, India and 2ZH College of Engineering and Technology, India
Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping  
Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa B, National Institute of Technology Karnataka, Surathkal
Robust Speech Coding Algorithm  
Akella Amarendra Babu1 and Ramadevi Yellasiri2, 1Progressive Engineering College, India and 2Chaitanya Bharathi
Institute of Technology, India