|
A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features [ Pdf ] Angel R. Otero1, Carlos E. Otero2 and Abrar Qureshi2, 1Nova Southeastern University, USA and 2University of Virginia's College at Wise, USA
|
Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option FIeld: A Characterization [ Pdf ] Danilo Valeros Bernardo and Doan B Hoang, The University of Technology- Sydney, Australia
|
Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique [ Pdf ] M. Kiran Kumar1, S. Mukthyar Azam1 and Shaik Rasool2,
1R.V.R & J.C College of Engg, India and 2S.C.E.T, India
|
Verification of Quantum Cryptography Protocols by Model Checking [ Pdf ] Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi1,3, 1FSO, University Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist, Morocco and 3Academy Hassan II of Sciences & Technology, Morocco
|
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks [ Pdf ] Vivaksha Jariwala1 and D. C. Jinwala2, 1C. K. Pithawalla College of Engineering and Technology, India and 2S. V. National Institute of Technology, India
|
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN [ Pdf ] Mohammed A. Abuhelaleh and Khaled M. Elleithy, University Of Bridgeport, USA
|
Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless Sensor Network [ Pdf ] Vikas Kumar1 and Rajender Kumar2,
NIT- kurukshetra, India
|
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network [ Pdf ] Jaydip Sen, Tata Consultancy Services Ltd - Kolkata, India
|
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-Server Environment [ Pdf ] Rafael Martinez-Pelaez1,2, Francisco Rico-Novella1, Cristina Satizabal2 and Jacek Pomykala3, 1Technical University of Catalonia, Spain, 2Universidad de la Sierra Sur, Mexico and 3Warsaw University, Poland
|
A (2,N) Visual Cryptographic Technique for Banking Applications [ Pdf ] Jayanta Kumar Pal1, J. K. Mandal2 and Kousik Dasgupta1, 1Kalyani Government Engineering College, India and 2University of Kalyani, India
|
Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents [ Pdf ] Mueen Uddin1, Kamran Khowaja2 and Azizah Abdul Rehman1, 1UTM, Malaysia and 2Isra University, Pakistan
|
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks [ Pdf ] Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis, Kingston University - London, United Kingdom
|
Lightweight C&C based botnet detection using Aho-Corasick NFA [ Pdf ] Udhayan J1, Anitha R2 and Hamsapriya T2, 1Karunya University, India and 2PSG College of Technology, India
|
Emergency Response Communications and Associated Security Challenges [ Pdf ] Muhammad Ibrahim Channa and Kazi M. Ahmed, Asian Institute of Technology, Thailand
|
A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN [ Pdf ] Soumya Maity, P Bera, S K Ghosh and Pallab Dasgupta, Indian Institute of Technology - Kharagpur, India
|
Additional Papers |
Effective Voice Calls Admission for Authorized User in Inter VOIP Network [ Pdf ] Subashri T and Vaidehi V, Anna University - Chennai, India
|
ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan [ Pdf ] Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing (C-DAC), India
|
Improving the Reliability of Detection of LSB Replacement Steganography [ Pdf ] Shreelekshmi R1, Wilscy M2 and C E Veni Madhavan3, 1College of Engineering -Trivandrum, India, 2University of Kerala, India and 3Indian Institute of Science, India
|
Zero Data Remnance Proof in Cloud Storage [ Pdf ] Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India
|
Bayesian Based Comment Spam Defending Tool [ Pdf ] Dhinaharan Nagamalai1, Beatrice Cynthia Dhinakaran2 and Jae Kwang Lee2, 1Wireilla Net Solutions, Australia and 2Hannam University, South Korea
|
A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords [ Pdf ] Dhananjay Kulkarni,
Boston University, USA.
|
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next Generation High Rate WPAN [ Pdf ] Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard,
Institute of Electronics and Telecommunications of Rennes (IETR),France.
|
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers [ Pdf ] Chang N. Zhang, Qian Yu and Xiao Wei Liu,
University of Regina, Canada.
|
Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs [ Pdf ] Theodore Zahariadis1, Helen Leligou1, Panagiotis Karkazis5,Panagiotis Trakadas2, Ioannis Papaefstathiou5,Charalambos Vangelatos3 and Lionel Besson4, 1 Technological Educational Institute of Chalkis, Greece,2 Hellenic Authority for Communications Security and Privacy (ADAE), Greece,3 Hellenic Aerospace Industry S.A., Greece,4 Thales Communications, France and 5 Technical University of Crete, Greece.
|
Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics Timers [ Pdf ] Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant,
University of Mauritius.
|
Improving TLS Security By Quantum Cryptography [ Pdf ] Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi3,
1FSO, University Mohamed Ist, Morocco,2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco.
|
Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network [ Pdf ]
Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2,
1Stamford University ,Bangladesh and 2American International University,Bangladesh.
|
Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network [ Pdf ]
S. Albert Raebra1 and S.Vijayalakshmi2,
1St.Josephs College, Bharathidasan University,India and 2Pondicherry University,India.
|
An Efficient IP Traceback Through Packet Marking Algorithm [ Pdf ]
Y.Bhavani and P.Niranjan Reddy,Kakatiya Institute of Technology and Science,India.
|
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment [ Pdf ]
K R Chandrasekhara Pillai1 and M P Sebastian2,
1N S S College of Engineering,India and 2Indian Institute of Management,India.
|
Wireless Security Measurement Using Data Value Index [ Pdf ]
Reza Amirpoor, 1Ajay Kumar 2 and Satish R. Deavne 3,1Bharati Vidyapeeth University,India,2JSPMs JAYAWANT Institute of Computer Applications,India and 3DR.D. Y. Patil Ramrao Adik Institute of Technology,India.
|
An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error Concealment [ Pdf ] Amit Phadikar1 and Santi P. Maity 2,
1MCKV Institute of Engineering,India and 2Bengal Engineering and Science University,India.
|
Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services [ Pdf ] Urjita Thakar1, Nirmal Dagdee2 and Sudarshan Varma3,
1Shri G.S. Institute of Technology and Science,India,2S.D. Bansal College of Technology,India and 3Ideavate Solutions, USA.
|
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem [ Pdf ]
Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology, Guwahati, India
|
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection [ Pdf ]
Dewan Md. Farid1, Nouria Harbi1, and Mohammad Zahidur Rahman2,
1University Lumiere Lyon 2 - France and 2Jahangirnagar University, Bangladesh
|
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags [ Pdf ]
Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, EGYPT
|
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
[ Pdf ]
S.Sangeetha1 & V.Vaidehi2,
1Angel College of Engineering, India and 2Madras Institute of Technology, India
|
Events Classification in Log Audit [ Pdf ]
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait
|
Analysis of the Security of BB84 by Model Checking [ Pdf ]
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi13,
1FSO, University Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco
|
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor [ Pdf ]
Mohsen Machhout1, Zied Guitouni1, Kholdoun Torki2, Lazhar Khriji3
and Rached Tourki1,
1Faculty of Sciences of Monastir, Tunisia,2TIMA - CMP Laboratory, France and 3Sultane Qaboos University, Oman
|
Impersonation Attack on EKE Protocol
[ Pdf ]
Shirisha Tallapally , Vaagdevi College of Engineering, India
|
A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy-Constrained Devices
[ Pdf ]
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore
|
Trust Based Content Distribution for Peer-To-Peer Overlay Networks [ Pdf ]
S.Ayyasamy1 and S.N. Sivanandam2,
1Tamilnadu College of Engineering, India and 2PSG College of Technology, India
|
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET
[ Pdf ]
T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology, Sathyamangalam,India
|
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
[ Pdf ]
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France
|
Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks [ Pdf ]
James Cannady, Nova Southeastern University, USA
|
A Frame Work for Ontological Privacy Preserved Mining [ Pdf ]
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch,
VIT University, India.
|
Workload Characterization of Spam Email Filtering Systems [ Pdf ]
Yan Luo, University of Massachusetts Lowell, USA
|
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio
and Video Cover Media [ Pdf ]
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA
|
Weakness on Cryptographic Schemes Based on Regular LDPC Codes [ Pdf ]
Omessaad Hamdi1 , Manel abdelhedi2, Ammar Bouallegue2 and Sami Harari3, 1SYSTEL, SUPCOM, Tunisia,
2SYSCOM, ENIT, Tunisia and
3SIS, USTV, France.
|
Advanced Security Management in Metro Ethernet Networks [ Pdf ]
Ammar Rayes, Cisco Systems, USA |
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application [ Pdf ]
1Syed S. Rizvi, 2Aasia Riasat and 3Khaled M. Elleithy,1, 3University of Bridgeport, USA and
2Institute of Business Management, Pakistan. |
Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures [ Pdf ]
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon |
|
IJNSA is listed in ERA 2012 as per the Australian Research Council (ARC) Journal Ranking. New
|