International Journal of Network Security & Its Applications (IJNSA)

ISSN: Online - 0974 - 9330

ISSN: Print - 0975 - 2307

November 2011, Volume 3, Number 6

Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security   [Pdf]
William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai, India

An Overview of Penetration Testing   [Pdf]
Aileen G. Bacudio1, Xiaohong Yuan1, Bei-Tseng Bill Chu2 and Monique Jones1, 1North Carolina A&T State University, USA and 2University of North Carolina at Charlotte, USA

The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks   [Pdf]
Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, India

Enhancing Infrastructure Security in Real Estate   [Pdf]
Kyle Dees and Syed (Shawon) Rahman, Capella University, USA

Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.   [Pdf]
Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National Institute of Technology, India

Role of Multiple Encryption in Secure Electronic Transaction   [Pdf]
Himanshu Gupta1 and Vinod Kumar Sharma2, 1Amity University Campus, India and 2Gurukula Kangri Vishwavidyalaya, India

Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis   [Pdf]
Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and Development Organisation (DRDO) - Bangalore, India

Statistical Quality Control Approaches to Network Intrusion Detection   [Pdf]
Rohitha Goonatilake1, Rafic Bachnak1 and Susantha Herath2, 1Texas A&M International University, USA and 2St. Cloud State University, USA

Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks   [Pdf]
Pinaki Sarkar1, Amrita Saha2 and Samiran Bag3, 1Jadavpur University, India, 2IIT Bombay, India and 3Indian Statistical Institute, India

Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key   [Pdf]
P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra University, India

User Authentication using Native Language Passwords   [Pdf]
Sreelatha Malempati1 and Shashi Mogalla2, 1R.V.R. & J.C. College of Engineering, India and 2Andhra University College of Engineering, India

Prediction of Malicious Objects in Computer Network and Defense   [Pdf]
Hemraj Sainia1, T. C. Panda2 and Minaketan Panda3, 1Alwar Institute of Engineering & Technology, India, 2Orissa Engineering College, India and 3SPANCO TELE, India

Blind Signature Scheme Based on Chebyshev Polynomials   [Pdf]
Maheswara Rao Valluri, Salalah College of Technology, Oman

Efficient Detection of Sybil attack Based on Cryptography in Vanet   [Pdf]
Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm   [Pdf]
Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India

Experimenting with the Novel Approaches in Text Steganography   [Pdf]
Shraddha Dulera1, Devesh Jinwala1 and Aroop Dasgupta2, 1S V National Institute of Technology, India and 2Bhaskaracharya Institute for Space Applications and Geo-Informatics, India

Techniques and Tools for Forensic Investigation of E-mail   [Pdf]
M. Tariq Banday, University of Kashmir, India

Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm   [Pdf]
S.G.Srikantaswamy1 and H.D.Phaneendra2, 1National Institute of Engineering - Mysore, India and 2 CSE NIE - Mysore, India

An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS   [Pdf]
K.Kuppusamy1 and S.Malathi2, 1Alagappa University, India and 2Manonmaniam Sundaranar University, India

Securing Mobile Agents in MANET against Attacks using Trust   [Pdf]
Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India

September 2011, Volume 3, Number 5

Information Security Synthesis in Online Universities   [Pdf]
Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA

A Multiple Ballots Election Scheme Using Anonymous Distribution   [Pdf]
Manabu Okamoto, Kanagawa Institute of Technology, Japan

Enhanced Secure Algorithm for Message Communication   [Pdf]
Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India

Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack   [Pdf]
Vikram Singh and Vatika, Chaudhary Devi Lal University, India

An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users   [Pdf]
Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand

Simulation of the Combined Method   [Pdf]
Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia

Prevention of Wormhole Attack in Wireless Sensor Network   [Pdf]
Dhara Buch1 and Devesh Jinwala2, 1Government Engineering College Rajkot, India and 2S.V. National Institute of Technology, India

DDNFS: a Distributed Digital Notary File System   [Pdf]
Alexander Zanger, Bond University, Australia

Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN   [Pdf]
R.Seshadri1 and N..Penchalaiah2, 1S.V.University, India and 2ASCET, India

Handwritten Text Image Authentication Using Back Propagation   [Pdf]
A S N Chakravarthy1, Penmetsa V Krishna Raja2 and P S Avadhani3, 1Sri Aditya Engineering College, India, 2JNTUK, India and 3Andhra University, India

A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks   [Pdf]
Hossein Jadidoleslamy, The University of Guilan, Iran

BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks   [Pdf]
Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent   [Pdf]
Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi, GLS Institute of Computer Technology, India

Special Issue on "CNSA 2011"

Botnet Command Detection using Virtual Honeynet   [Pdf]
J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India

CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack   [Pdf]
L.Kavisankar and C.Chellappan, Anna University, India

Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks usingReed Solomon Code for Key Predistribution   [Pdf]
Pinaki Sarkar1 and Aritra Dhar2, 1Jadavpur University, India and 2Gurunanak Institute of Technology, India

Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography   [Pdf]
G.Geetha1 and C.Jayakumar2, 1Jerusalem college of Engineering, India and 2RMK Engineering college, India

Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism   [Pdf]
Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela, India

Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET   [Pdf]
V. Anjana Devi1 and R. S. Bhuvaneswaran2, 1St. Joseph's College of Engineering, India and 2Anna University, India

Error Detection and Correction for Distributed Group Key Agreement Protocol   [Pdf]
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India

July 2011, Volume 3, Number 4

Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network   [Pdf]
Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen, Algeria

Wavelet Thresholding Approach For Image Denoising   [Pdf]
Pankaj Hedaoo and Swati S Godbole, G. H. Raisoni College of Engineering, Nagpur, India.

Architecture Of A Identity Based Firewall System   [Pdf]
Nenad Stojanovski1 and Marjan Gusev2, 1Makedonski Telekom AD, Orce Nikolov BB, 1000 Skopje, Macedonia and 2Ss. Cyril and Methodius University, Macedonia

Cryptovirology: Virus Approach  [Pdf]
Shivale Saurabh Anandrao, Vishwakarma Institute Of Information Technology - Pune, India

Security Apprehensions In Different Regions Of Cloud Captious Grounds   [Pdf]
Gurdev Singh1 Amit Sharma1 and Manpreet Singh Lehal2, 1Eternal University, HP India and 2Lyallpur Khalsa College, Punjab India

A Novel Header Matching Algorithm For Intrusion Detection Systems   [Pdf]
Mohammad A. Alia1, Adnan A. Hnaif1, Hayam K. Al-Anie1, Khulood Abu Maria1, Ahmed M. Manasrah2 and M. Imran Sarwar3, 1Al Zaytoonah University, Jordan, 2Al Yarmouk University, Jordon and 3Universiti Sains Malaysia, Malaysia

A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing   [Pdf]
S.S. Prasad, Rithika Baruah and Siddharth.A, National Institute of Technology, Jamshedpur, India

E-Voting Protocol Based On Public-Key Cryptography   [Pdf]
Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif, Al Zaytoonah University, Jordan

Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using Various Optimization Techniques As Well As Network Management Models Giving Special Emphasis To Attack Tree Model   [Pdf]
Prabhat Kumar Vishwakarma, University of Gondar, Ethiopia

Governing Information Security In Conjunction With Cobit And Iso 27001   [Pdf]
Tolga Mataracioglu1 and Sevgi Ozkan2, 1TUBITAK National Research Institute of Electronics and Cryptology (UEKAE), Turkey and 2Middle East Technical University, Turkey

An Evaluation Of Fingerprint Security Using Noninvertible Biohash   [Pdf]
N.Radha1 and S.Karthikeyan2, 1Karpagam University, India and 2College of Applied Sciences, Sultanate of Oman

RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks   [Pdf]
R. Ramesh and S. Gayathri, Anna University, India

An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of Encryption On Mac Layer   [Pdf]
Gulshan Kumar and Mritunjay Rai, Lovely Professional University, Jalandhar, India.

An Ancient Indian Board Game as a Tool for Authentication  [Pdf]
Sreelatha Malempati1 and Shashi Mogalla2, 1RVR & JC College of Engineering, Guntur, A.P and 2Andhra University College of Engineering, Visakhapatnam, A.P

Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption   [Pdf]
Jeyamala Chandrasekaran1 Subramanyan B1 and Raman G.S2, 1Thiagarajar College of Engineering, Madurai and 2KLN College of Information Technology, Madurai

May 2011, Volume 3, Number 3

System Dynamics Based Insider Threats Modeling  [Pdf]
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China

Countermeasure Tool - Carapace for Network Security  [Pdf]
Anand Bisen, Shrinivas Karwa and B.B. Meshram, Veermata Jijabai Technological Institute, India

On Design of PUF-Based Random Number Generators  [Pdf]
Mehdi Ayat1, Reza Ebrahimi Atani2 and Sattar Mirzakuchaki1, 1Iran University of Science and Technology, Iran and 2The University of Guilan, Iran

Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment  [Pdf]
Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India

Data Security Using Private Key Encryption System Based on Arithmetic Coding  [Pdf]
Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India

PKI in Government Identity Management Systems  [Pdf]
Ali M. Al-Khouri, Emirates Identity Authority, United Arab Emirates

Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN  [Pdf]
Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi Pradhan, NM Institute of Engineering and Technology, India

Authentication Schemes for Session Passwords Using Color and Images  [Pdf]
M Sreelatha1, M Shashi2, M Anirudh1, Md Sultan Ahamer1 and V Manoj Kumar1, 1RVR & JC College of Engineering, India and 2Andhra University College of Engineering, India

Transformation from Identity Stone Age to Digital Identity  [Pdf]
Mohit Kohli, Rolta Technology Limited (RIL), India

Enterprise Delegation for Service Based Systems  [Pdf]
Coimbatore Chandersekaran1 and William R. Simpson2, 1The Secretary of the Air Force, USA and 2The Institute for Defense Analyses, USA

An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification  [Pdf]
Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of Technology - Guwahati, India

DDoS Attack and Defense Scheme in Wireless Ad hoc Networks  [Pdf]
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India

TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET  [Pdf]
Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt

March 2011, Volume 3, Number 2

A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks  [Pdf]
Mohammed Mana1, Mohammed Feham1 and Boucif Amar Bensaber2, 1University of Tlemcen, Algeria and 2Universite du Quebec a Trois-Rivieres, Canada

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards  [Pdf]
Ashok Kumar Das, International Institute of Information Technology - Hyderabad, India

Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable-Length Key  [Pdf]
Sabyasachi Samanta1, Saurabh Dutta2 and Goutam Sanyal3, 1Haldia Institute of Technology, India, 2Dr. B. C. Roy Engineering College - Durgapur, India and 3National Institute of Technology - Durgapur, India

The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations  [Pdf]
Harry Yosh, HECO Ltd - Canberra, Australia

Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System  [Pdf]
Renuka Prasad.B1, Annamma Abraham2, Abhas Abhinav3, Sunil.V.Gurlahosur4 and Srinivasa Y4, 1R.V.College of Engineering, India, 2BMSIT - Bengaluru, India, 3DeepRootLinux Pvt Ltd, India, 4SIT - Tumkur, India

Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel  [Pdf]
Raju Singh and A.K.Vatsa, Shobhit University, India.

Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience  [Pdf]
C Singh, L Singh and E Marks, University of Guyana

Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption  [Pdf]
Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of Technology - Durgapur, India

A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password  [Pdf]
Tanmay Bhattacharya1, Sirshendu Hore2, Ayan Mukherjee3 and S. R. Bhadra Chaudhuri4, 1JIS College Engineering, India, 2Hooghly Engineering & Technology College, India, 3Institute of Science & Technology, India and 4Bengal Engineering & Science University, India

Replication Attack Mitigations for Static And Mobile WSN  [Pdf]
V.Manjula and C.Chellappan, Anna University - Chennai, India

Stage Staffing Scheme for Copyright Protection In Multimedia  [Pdf]
Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology - Guwahati, India

Substitution-diffusion based Image Cipher  [Pdf]
Narendra K Pareek1, Vinod Patidar2 and Krishan K Sud2, 1M L Sukhadia University - Udaipur, India and 2Sir Padampat Singhania University, India

A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers  [Pdf]
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India

Image Encryption Based On Diffusion And Multiple Chaotic Maps  [Pdf]
G.A.Sathishkumar1, K.Bhoopathy bagan2 and N.Sriraam3, 1Sri Venkateswara College of Engineering, India, 2Madras Institute of Technology, India and 3SSN College of Engineering, India

A QoS Based MAC Protocol For Wireless Ad-hoc Network  [Pdf]
Vandana khare1, D.SrinivasRao2 and Y.Madhavee Latha3, 1CMEC - Hyd, India, 2JNTUH - Hyd, India and 3MRECW - Hyd, India

January 2011, Volume 3, Number 1

Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options  [Pdf]
Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA

Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic Algorithm For VOIP  [Pdf]
Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University Teknologi Malaysia, Malaysia

An Overview Of The Security Concerns In Enterprise Cloud Computing  [Pdf]
Anthony Bisong1 and Syed (Shawon) M. Rahman2, 1Capella University,USA and 2University of Hawaii-Hilo, USA

A Human-Centric Approach To Group-Based Context-Awareness  [Pdf]
Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, University of Isfahan, Iran

Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector  [Pdf]
Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK

Failure of A Mix Network  [Pdf]
Kun Peng, Institute for Infocomm Research, Singapore

Analysis of Web Logs And Web User In Web Mining  [Pdf]
L.K. Joshila Grace1, V.Maheswari1 and Dhinaharan Nagamalai2, 1Sathyabama University, India and 2Wireilla Net Solutions PTY Ltd, Australia