- Home
- Forthcoming Papers
- Archives
- 2010 Volume 2
- 2009 Volume 1. Number 3
- 2009 Volume 1. Number 2
- 2009 Volume 1. Number 1

October 2009, Volume 1. Number 3
Integrating Identity-Based Cryptography in IMS Service Authentication [ pdf ]
Mohamed Abid1, Songbo Song2, Hassnaa Moustafa2 and Hossam Afifi1,1Telecom & Management SudParis ,Evry, France
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions [ pdf ]
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT University,INDIA.
Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication Scheme [ pdf ]
Mohammed Aijaz Ahmed1, D. Rajya Lakshmi2 and Sayed Abdul Sattar3 GITAM University, India
Psim: A Tool for Analysis of Device Pairing Methods [ pdf ]
Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK
Data Security in Mobile Devices by GEO Locking
[ pdf ]
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India
Performance Evaluation of a New Route Optimization Technique for Mobile IP [ pdf ]
Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia University, Egypt
Security Properties in an Open Peer-to-Peer Network [ pdf ]
Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire DInformatique Fondamentale DOrleansUniversite DOrleans, Ensi de Bourges, France
A Security Framework for SOA Applications in Mobile Environment [ pdf ]
Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos portugueses, Campus do Bacanga, Sao Luis, Brazil
Securing AODV for MANETs using Message Digest with Secret Key
[ pdf ]
Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute of Technology & Science, India
Application Specific Usage control Implementation Verification
[ pdf ]
Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta
Indian Institute of Technology-Kharagpur, India
July 2009, Volume 1. Number 2
Iterative method for improvement of coding and decryption [ pdf ]
Natasa Zivic,
Institute for Data Communication Systems, University of Siegen,Germany
Tools A new key establishment Scheme for wireless sensor networks [ pdf ]
Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu,
Department of Computer Science, The University of Hong Kong, Hong Kong
Dynamic IDP signature processing by fast elimination using DFA [ pdf ]
Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer Networks & Internet Engineering Division, Centre for Development of Advanced Computing,Bangalore, India
Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless packet networks [ pdf ]
G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of Technology,Tamilnadu, India,
Clustered Hierarchy in Sensor Networks: Performance and Security [ pdf ]
Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar,
School of Engineering, University of Bridgeport
USA
Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States [ pdf ]
Yoshito Kanamori 1 and Seong-Moo Yoo 2,
1 University of Alaska Anchorage, Alaska, USA,
2 The University of Alabama in Huntsville, Alabama, USA
Intelligent Intrusion Detection System Framework Using Mobile Agents [ pdf ]
N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT University, India
On Generation of Firewall Log Status Reporter (SRr) Using Perl [ pdf ]
Sugam Sharma1, Hari Cohly2, and Tzusheng Pei2,
1 Iowa State University, USA, 2Jackson State University, USA
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration [ pdf ]
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and Technology (NIST),USA
April 2009, Volume 1. Number 1
Using Rough Set and Support Vector Machine for Network Intrusion Detection [ pdf ]
Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of Technology,Taiwan, R.O.C
Tools and Techniques for Network Forensics [ pdf ]
Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State University,USA
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images [ pdf ]
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering & Technology, India
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard Algorithm [ pdf ]
Poonam Garg,Institute of Management Technology, India
A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks [ pdf ]
Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of Engineering and Management,India,
West Bengal University of Technology,India, University of Calcutta,India
AIRCC | Contact Us