- Home
- Forthcoming Papers
- Archives
- 2011 Volume 3. Number 4
- 2011 Volume 3. Number 3
- 2011 Volume 3. Number 2
- 2011 Volume 3. Number 1
- 2010 Volume 2
- 2009 Volume 1

November 2011, Volume 3, Number 6 |
Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security
[Pdf] |
An Overview of Penetration Testing
[Pdf] |
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
[Pdf] |
Enhancing Infrastructure Security in Real Estate
[Pdf] |
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.
[Pdf] |
Role of Multiple Encryption in Secure Electronic Transaction
[Pdf] |
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
[Pdf] |
Statistical Quality Control Approaches to Network Intrusion Detection
[Pdf] |
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks
[Pdf] |
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
[Pdf] |
User Authentication using Native Language Passwords
[Pdf] |
Prediction of Malicious Objects in Computer Network and Defense
[Pdf] |
Blind Signature Scheme Based on Chebyshev Polynomials
[Pdf] |
Efficient Detection of Sybil attack Based on Cryptography in Vanet
[Pdf] |
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
[Pdf] |
Experimenting with the Novel Approaches in Text Steganography
[Pdf] |
Techniques and Tools for Forensic Investigation of E-mail
[Pdf] |
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm
[Pdf] |
An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS
[Pdf] |
Securing Mobile Agents in MANET against Attacks using Trust
[Pdf] |
September 2011, Volume 3, Number 5 |
Information Security Synthesis in Online Universities
[Pdf] |
A Multiple Ballots Election Scheme Using Anonymous Distribution
[Pdf] |
Enhanced Secure Algorithm for Message Communication
[Pdf] |
Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
[Pdf] |
An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users
[Pdf] |
Simulation of the Combined Method
[Pdf] |
Prevention of Wormhole Attack in Wireless Sensor Network
[Pdf] |
DDNFS: a Distributed Digital Notary File System
[Pdf] |
Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN
[Pdf] |
Handwritten Text Image Authentication Using Back Propagation
[Pdf] |
A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks
[Pdf] |
BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks
[Pdf] |
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
[Pdf] |
Special Issue on "CNSA 2011" |
Botnet Command Detection using Virtual Honeynet
[Pdf] |
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
[Pdf] |
Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks usingReed Solomon Code for Key Predistribution
[Pdf] |
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography
[Pdf] |
Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism
[Pdf] |
Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET
[Pdf] |
Error Detection and Correction for Distributed Group Key Agreement Protocol
[Pdf] |
July 2011, Volume 3, Number 4 |
Novel Hybrid Intrusion Detection System
For Clustered Wireless Sensor Network
[Pdf] |
Wavelet Thresholding Approach For Image
Denoising
[Pdf] |
Architecture Of A Identity Based Firewall
System
[Pdf] |
Cryptovirology: Virus Approach [Pdf] |
Security Apprehensions In Different Regions Of Cloud Captious Grounds
[Pdf] |
A Novel Header Matching Algorithm For Intrusion Detection Systems
[Pdf] |
A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing
[Pdf] |
E-Voting Protocol Based On Public-Key
Cryptography
[Pdf] |
Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using Various Optimization Techniques As Well As Network Management Models Giving Special Emphasis To Attack Tree Model
[Pdf] |
Governing Information Security In Conjunction With Cobit And Iso 27001
[Pdf] |
An Evaluation Of Fingerprint Security Using Noninvertible Biohash
[Pdf] |
RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
[Pdf] |
An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of
Encryption On Mac Layer [Pdf] |
An Ancient Indian Board Game as a Tool for Authentication [Pdf] |
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption [Pdf] |
May 2011, Volume 3, Number 3 |
System Dynamics Based Insider Threats Modeling [Pdf] |
Countermeasure Tool - Carapace for Network Security [Pdf] |
On Design of PUF-Based Random Number Generators [Pdf] |
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment [Pdf] |
Data Security Using Private Key Encryption System Based on Arithmetic Coding [Pdf] |
PKI in Government Identity Management Systems [Pdf] |
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN [Pdf] |
Authentication Schemes for Session Passwords Using Color and Images [Pdf] |
Transformation from Identity Stone Age to Digital Identity [Pdf] |
Enterprise Delegation for Service Based Systems [Pdf] |
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification [Pdf] |
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks [Pdf] |
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET [Pdf] |
March 2011, Volume 3, Number 2 |
A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks [Pdf] |
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards [Pdf] |
Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable-Length Key [Pdf] |
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations [Pdf] |
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System [Pdf] |
Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel [Pdf] |
Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience [Pdf] |
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption [Pdf] |
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password [Pdf] |
Replication Attack Mitigations for Static And Mobile WSN [Pdf] |
Stage Staffing Scheme for Copyright Protection In Multimedia [Pdf] |
Substitution-diffusion based Image Cipher [Pdf] |
A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers [Pdf] |
Image Encryption Based On Diffusion And Multiple Chaotic Maps [Pdf] |
A QoS Based MAC Protocol For Wireless Ad-hoc Network [Pdf] |
January 2011, Volume 3, Number 1 |
Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options [Pdf] |
Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic Algorithm For VOIP [Pdf] |
An Overview Of The Security Concerns In Enterprise Cloud Computing [Pdf] |
A Human-Centric Approach To Group-Based Context-Awareness [Pdf] |
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector [Pdf] |
Failure of A Mix Network [Pdf] |
Analysis of Web Logs And Web User In Web Mining [Pdf] |
AIRCC | Contact Us