International Journal of Network Security & Its Applications (IJNSA)

ISSN: Online - 0974 - 9330

ISSN: Print - 0975 - 2307



May 2012, Volume 4, Number 3

Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems   [Pdf]
Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse Toulouse, France

Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks  [Pdf]
Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and Technology Noida, India

Security Threats Analysis in Bluetooth-Enabled Mobile Devices  [Pdf]
Robayet Nasim, University of Science & Technology Chittagong, Bangladesh

Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under Water Acoustic Sensor Networks  [Pdf]
Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of Engineering Chennai, India

The New Age of Computer Virus and Their Detection  [Pdf]
Nitesh Kumar Dixit1, Lokesh mishra2, Mahendra Singh Charan1 and Bhabesh Kumar Dey1, 1BIET Sikar, India and 2NCAC Sikar, India

Provable Secure Identity Based Signcryption Schemes without Random Oracles  [Pdf]
Prashant Kushwah1 and Sunder Lal2, 1Banasthali University, India and 2Veer Bahadur Singh Purvanchal University, India

Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation  [Pdf]
P. Devaki and G. Raghavendra Rao, NIE Mysore, India

Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection  [Pdf]
P.Natesan and P.Balasubramanie, Kongu Engineering College, India

March 2012, Volume 4, Number 2

A Generic Framework for Device Pairing in Ubiquitous Computing Environments   [Pdf]
Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja, University of Sussex, UK

LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs   [Pdf]
Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India

Cross Layer Intrusion Detection System for Wireless Sensor Network   [Pdf]
Djallel Eddine Boubiche and Azeddine Bilami, LaSTIC Laboratory - UHL Batna, Algeria

Minimizing the Time of Spam Mail ‎Detection by Relocating ‎Filtering System to the Sender ‎Mail Server  [Pdf]
Alireza Nemaney Pour1, Raheleh Kholghi2 and Soheil Behnam Roudsari2, 1Islamic Azad University of Abhar, Iran and 2Sharif University of Technology, Iran

A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids  [Pdf]
G.Jacob Victor1, M Sreenivasa Rao2 and V.CH. Venkaiah3, 1SERP - RD Department, India, 2JNTU - Hyderabad, India and 3CRRao AIMS & CS - Hyderabad, India

Cloud Computing Security in Business Information Systems   [Pdf]
Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Ss. Cyril and Methodius University, Macedonia

Design and Analysis of a Novel Digital Image Encryption Scheme   [Pdf]
Narendra K Pareek, M L Sukhadia University, India

An Implementation of Intrusion Detection System Using Genetic Algorithm   [Pdf]
Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, Shahjalal University of Science and Technology, Bangladesh

Forensic Analysis of Windows Registry Against Intrusion   [Pdf]
Haoyang Xie1, Keyu Jiang1, Xiaohong Yuan2 and Hongbiao Zeng1, 1Fort Hays State University, USA and 2North Carolina A&T State University, USA

LPM: A Distributed Architecture and Alogorithms for Location Privacy in LBS   [Pdf]
Muhamed Ilyas and R. Vijayakumar, Mahatma Gandhi University Kottayam, India

Co-operative Wireless Intrusion Detection System Using MIBs From SNMP   [Pdf]
Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar, College of Engineering - Pune, India

Lattice Based Tools in Cryptanalysis for Public Key Cryptography   [Pdf]
R.Santosh Kumar1, C.Narasimham2 and S.Pallam Setty3, 1MVGR College of Engg., India, 2VR Siddhartha Engineering College, India and 3Andhra University, India

Identification of Image Spam by Using Low Level & Metadata Features   [Pdf]
Anand Gupta, Chhavi Singhal and Somya Aggarwal, Netaji Subhas Institute of Technology, India

Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security   [Pdf]
S. Sree Vivek1, S. Sharmila Deva Selvi1, V. Radhakishan2, C. Pandu Rangan1, 1IIT Madras, India and 2NIT Trichy, India

Passblot: A Highly Scalable Graphical one Time Password System   [Pdf]
Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V Gangashetty, IIIT - Hyderabad, India

January 2012, Volume 4, Number 1

Optimizing One Fair Document Exchange Protocol   [Pdf]
Abdullah M. Alaraj, Qassim University, Saudi Arabia

IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots   [Pdf]
K.Munivara Prasad1, A.Rama Mohan Reddy2 and V Jyothsna3, 1Rayalaseema University, India, 2SV University, India and 3Sree vidyanikethan Engg.College, India

Protected Data Objects Replication in Data Grid   [Pdf]
G. Aruna Kranthi and D. Shashi Rekha, S.R. Engineering College - Warangal, India

Efficient & Secure Data Hiding Using Secret Reference Matrix   [Pdf]
Laxman Tawade1, Rajshree Mahajan2 and Chandan Kulthe2, 1Pune University, India and 2Aditya Engineering College, India

Risks and Remedies in E-Learning System   [Pdf]
Nikhilesh Barik and Sunil Karforma, Burdwan University, India

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks   [Pdf]
Priyank Singhal and Nataasha Raul, Sardar Patel Institute of Technology - University of Mumbai, India

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network   [Pdf]
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women, India

Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks   [Pdf]
Sridhar Subramanian1 and Baskaran Ramachandran2, 1Easwari Engineering College - Chennai, India and 2Anna University - Chennai, India

A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security  [Pdf]
Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India

A Security Suite for Wireless Body Area Networks   [Pdf]
Raghav V. Sampangi1, Saurabh Dey2, Shalini R. Urs3 and Srinivas Sampalli1, 1Dalhousie University, Canada, 2Analytics Quotient Bangalore, India and 3University of Mysore, India

A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing   [Pdf]
G.S. Mamatha, R.V. College of Engineering Bangalore, India

The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine   [Pdf]
Besma Othmani1, Mohsen Machhout1, Houcine Mejri1,2, Hafedh Belmabrouk1 and Rached Tourki1, 1Laboratoire d'Electronique et Micro Electronique Faculte des Sciences de Monastir, Tunisia and 2Ecole Preparatoire aux Academies Melitaires, Tunisia