Volume 1

December 2012, Volume 1, Number 6

The New Approach to provide Trusted Platform in MANET
Renu Dalal1, Manju Khari1 and Yudhvir Singh2, 1AIACTR, India and 2U.I.E.T M.D University, India

Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique on the Bases of Performance
Analysis of cryptographic Algorithms

Gurjeet Kaur and Monika Sachdeva,S.B.S State Technical Campus,India

October 2012, Volume 1, Number 5

Credit Card Fraud Detection Based on Ontology Graph
Ali Ahmadian Ramaki, Reza Asgari and Reza Ebrahimi Atani,GuilanUniversity, Iran

Study and Performance Evaluation of Security-Throughput Tradeoff with Link Adaptive Encryption Scheme
Poonam Jindal and Brahmjit Singh,NIT Kurukshetra, India

Key Generation and Certification using Multilayer Perceptron in Wireless Communication [KGCMLP]
Arindam Sarkar and J. K. Mandal,University of Kalyani, India

August 2012, Volume 1, Number 3/4

URL Analysis and Cross Site Scripting with Secured Authentication Protocol System in Financial Services
R.Sujatha and G.Arumugam, Madurai Kamaraj University,India.

Information Retrieval from Internet Applications for Digital Forensic
Ipsita Mohanty and R. Leela Velusamy, National Institute of Technology,India.

Effective Implementation and Avalanche Effect of AES
Amish Kumar and Namita Tiwari, MANIT, India.

Power and Trust based Secured Routing Approach in MANET
Arnab Banerjee, Aniruddha Bhattacharyya and Dipayan Bose, Institute of Engineering & Management, Saltlake, India.

Rushing Attack Defending Context Aware Trusted AODV in Ad-Hoc Network
Swarnali Hazra and S.K.Setua, University of Calcutta, India

Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol
Zulfa Shaikh1 and Poonam Garg2, 1Acropolis Institute of Technology & Research, India and 2Institute of Management
Technology, Ghaziabad, India.

Hybrid Message-Embedded Cipher using Logistic Map
Mina Mishra1 and V.H. Mankar2, 1Nagpur University, India and 2Government Polytechnic, Nagpur, India.

Generating Audio Signal Authentication through Secret Embedded Self Harmonic Component [GASASH]
Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, Kolaghat , India and 2University of Kalyani, India.

April 2012, Volume 1, Number 2

Hash Based Least Significant Bit Technique for Video Steganography[HLSB]
Kousik Dasgupta1, J.K. Mandal2 and Paramartha Dutta3, 1Kalyani Govt. Engineering College, India, 2Kalyani University, India
and 3Visva-Bharati University, India

February 2012, Volume 1, Number 1

Design and Development of a Ticket-Based Scheduling and Load Sharing Algorithm for Optimal Resource Usage in Mobile
Computing Environments

Natarajan Meghanathan1 and Sanjeev Baskiyar2, 1Jackson State University, USA and 2Auburn University, USA

Trust-Based Approach in Wireless Sensor Networks Using an Agent to Each Cluster
Yenumula B. Reddy, Grambling State University, USA