October 2009, Volume 1. Number 3

Integrating Identity-Based Cryptography in IMS Service Authentication [ Pdf ]
Mohamed Abid1, Songbo Song2, Hassnaa Moustafa2 and Hossam Afifi1,1Telecom & Management SudParis ,Evry, France
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions [ Pdf ]
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT University,INDIA.
Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication Scheme [ Pdf ]
Mohammed Aijaz Ahmed1, D. Rajya Lakshmi2 and Sayed Abdul Sattar3 GITAM University, India
Psim: A Tool for Analysis of Device Pairing Methods [ Pdf ]
Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK
Data Security in Mobile Devices by GEO Locking [ pdf ]
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India
Performance Evaluation of a New Route Optimization Technique for Mobile IP [ Pdf ]
Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia University, Egypt
Security Properties in an Open Peer-to-Peer Network [ Pdf ]
Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire DInformatique Fondamentale DOrleansUniversite DOrleans, Ensi de Bourges, France
A Security Framework for SOA Applications in Mobile Environment [ Pdf ]
Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos portugueses, Campus do Bacanga, Sao Luis, Brazil
Securing AODV for MANETs using Message Digest with Secret Key [ Pdf ]
Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute of Technology & Science, India
Application Specific Usage control Implementation Verification [ Pdf ]
Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta Indian Institute of Technology-Kharagpur, India

July 2009, Volume 1. Number 2

Iterative method for improvement of coding and decryption [ Pdf ]
Natasa Zivic, Institute for Data Communication Systems, University of Siegen,Germany
Tools A new key establishment Scheme for wireless sensor networks [ Pdf ]
Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, Department of Computer Science, The University of Hong Kong, Hong Kong
Dynamic IDP signature processing by fast elimination using DFA [ Pdf ]
Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer Networks & Internet Engineering Division, Centre for Development of Advanced Computing,Bangalore, India
Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless packet networks [ Pdf ]
G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of Technology,Tamilnadu, India
Clustered Hierarchy in Sensor Networks: Performance and Security [ Pdf ]
Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar, School of Engineering, University of Bridgeport USA
Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States [ Pdf ]
Yoshito Kanamori 1 and Seong-Moo Yoo 2, 1 University of Alaska Anchorage, Alaska, USA, 2 The University of Alabama in Huntsville, Alabama, USA
Intelligent Intrusion Detection System Framework Using Mobile Agents [ Pdf ]
N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT University, India
On Generation of Firewall Log Status Reporter (SRr) Using Perl [ Pdf ]
Sugam Sharma1, Hari Cohly2, and Tzusheng Pei2, 1 Iowa State University, USA, 2Jackson State University, USA
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration [ Pdf ]
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and Technology (NIST),USA

April 2009, Volume 1. Number 1

Using Rough Set and Support Vector Machine for Network Intrusion Detection [ Pdf ]
Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of Technology,Taiwan, R.O.C
Tools and Techniques for Network Forensics [ Pdf ]
Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State University,USA
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images [ Pdf ]
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering & Technology, India
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard Algorithm [ Pdf ]
Poonam Garg,Institute of Management Technology, India
A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks [ Pdf ]
Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of Engineering and Management,India,
West Bengal University of Technology,India, University of Calcutta,India