International Journal of Network Security & Its Applications (IJNSA)

ISSN: Online - 0974 - 9330

ISSN: Print - 0975 - 2307

October 2009, Volume 1. Number 3

Integrating Identity-Based Cryptography in IMS Service Authentication [ pdf ]
Mohamed Abid1, Songbo Song2, Hassnaa Moustafa2 and Hossam Afifi1,1Telecom & Management SudParis ,Evry, France

Agent Based Trust Management Model Based on Weight Value Model for Online Auctions [ pdf ]
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT University,INDIA.

Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication Scheme [ pdf ]
Mohammed Aijaz Ahmed1, D. Rajya Lakshmi2 and Sayed Abdul Sattar3 GITAM University, India

Psim: A Tool for Analysis of Device Pairing Methods [ pdf ]
Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK

Data Security in Mobile Devices by GEO Locking [ pdf ]
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India

Performance Evaluation of a New Route Optimization Technique for Mobile IP [ pdf ]
Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia University, Egypt

Security Properties in an Open Peer-to-Peer Network [ pdf ]
Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire DInformatique Fondamentale DOrleansUniversite DOrleans, Ensi de Bourges, France

A Security Framework for SOA Applications in Mobile Environment [ pdf ]
Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos portugueses, Campus do Bacanga, Sao Luis, Brazil

Securing AODV for MANETs using Message Digest with Secret Key [ pdf ]
Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute of Technology & Science, India

Application Specific Usage control Implementation Verification [ pdf ]
Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta Indian Institute of Technology-Kharagpur, India

July 2009, Volume 1. Number 2

Iterative method for improvement of coding and decryption [ pdf ]
Natasa Zivic, Institute for Data Communication Systems, University of Siegen,Germany

Tools A new key establishment Scheme for wireless sensor networks [ pdf ]
Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, Department of Computer Science, The University of Hong Kong, Hong Kong

Dynamic IDP signature processing by fast elimination using DFA [ pdf ]
Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer Networks & Internet Engineering Division, Centre for Development of Advanced Computing,Bangalore, India

Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless packet networks [ pdf ]
G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of Technology,Tamilnadu, India,

Clustered Hierarchy in Sensor Networks: Performance and Security [ pdf ]
Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar, School of Engineering, University of Bridgeport USA

Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States [ pdf ]
Yoshito Kanamori 1 and Seong-Moo Yoo 2, 1 University of Alaska Anchorage, Alaska, USA, 2 The University of Alabama in Huntsville, Alabama, USA

Intelligent Intrusion Detection System Framework Using Mobile Agents [ pdf ]
N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT University, India

On Generation of Firewall Log Status Reporter (SRr) Using Perl [ pdf ]
Sugam Sharma1, Hari Cohly2, and Tzusheng Pei2, 1 Iowa State University, USA, 2Jackson State University, USA

Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration [ pdf ]
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and Technology (NIST),USA

April 2009, Volume 1. Number 1

Using Rough Set and Support Vector Machine for Network Intrusion Detection [ pdf ]
Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of Technology,Taiwan, R.O.C

Tools and Techniques for Network Forensics [ pdf ]
Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State University,USA

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images [ pdf ]
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering & Technology, India

A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard Algorithm [ pdf ]
Poonam Garg,Institute of Management Technology, India

A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks [ pdf ]
Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of Engineering and Management,India,
West Bengal University of Technology,India, University of Calcutta,India