- Home
- Forthcoming Papers
- Archives
- 2012 Volume 4. Number 4
- 2012 Volume 4. Number 3
- 2012 Volume 4. Number 2
- 2012 Volume 4. Number 1
- 2011 Volume 3
- 2010 Volume 2
- 2009 Volume 1

May 2012, Volume 4, Number 3 |
Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems [Pdf] |
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks [Pdf] |
Security Threats Analysis in Bluetooth-Enabled Mobile Devices [Pdf] |
Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under Water Acoustic Sensor Networks [Pdf] |
The New Age of Computer Virus and Their Detection [Pdf] |
Provable Secure Identity Based Signcryption Schemes without Random Oracles [Pdf] |
Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation [Pdf] |
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection [Pdf] |
March 2012, Volume 4, Number 2 |
A Generic Framework for Device Pairing in Ubiquitous Computing Environments
[Pdf] |
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
[Pdf] |
Cross Layer Intrusion Detection System for Wireless Sensor Network
[Pdf] |
Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender Mail Server [Pdf] |
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids [Pdf] |
Cloud Computing Security in Business Information Systems
[Pdf] |
Design and Analysis of a Novel Digital Image Encryption Scheme
[Pdf] |
An Implementation of Intrusion Detection System Using Genetic Algorithm
[Pdf] |
Forensic Analysis of Windows Registry Against Intrusion
[Pdf] |
LPM: A Distributed Architecture and Alogorithms for Location Privacy in LBS
[Pdf] |
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
[Pdf] |
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
[Pdf] |
Identification of Image Spam by Using Low Level & Metadata Features
[Pdf] |
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
[Pdf] |
Passblot: A Highly Scalable Graphical one Time Password System
[Pdf] |
January 2012, Volume 4, Number 1 |
Optimizing One Fair Document Exchange Protocol
[Pdf] |
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots [Pdf] |
Protected Data Objects Replication in Data Grid [Pdf] |
Efficient & Secure Data Hiding Using Secret Reference Matrix [Pdf] |
Risks and Remedies in E-Learning System [Pdf] |
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks [Pdf] |
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc
Network [Pdf] |
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks [Pdf] |
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security [Pdf] |
A Security Suite for Wireless Body Area Networks [Pdf] |
A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing [Pdf] |
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine [Pdf] |
AIRCC | Contact Us