|
Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security
[ Pdf ]
William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai, India
|
An Overview of Penetration Testing
[ Pdf ]
Aileen G. Bacudio1, Xiaohong Yuan1, Bei-Tseng Bill Chu2 and Monique Jones1, 1North Carolina A&T State University, USA and 2University of North Carolina at Charlotte, USA
|
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
[ Pdf ]
Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, India
|
Enhancing Infrastructure Security in Real Estate
[ Pdf ]
Kyle Dees and Syed (Shawon) Rahman, Capella University, USA
|
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.
[ Pdf ]
Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National Institute of Technology, India
|
Role of Multiple Encryption in Secure Electronic Transaction
[ Pdf ]
Himanshu Gupta1 and Vinod Kumar Sharma2, 1Amity University Campus, India and 2Gurukula Kangri Vishwavidyalaya, India
|
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
[ Pdf ]
Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and Development Organisation (DRDO) - Bangalore, India
|
Statistical Quality Control Approaches to Network Intrusion Detection
[ Pdf ]
Rohitha Goonatilake1, Rafic Bachnak1 and Susantha Herath2, 1Texas A&M International University, USA and 2St. Cloud State University, USA
|
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks
[ Pdf ]
Pinaki Sarkar1, Amrita Saha2 and Samiran Bag3, 1Jadavpur University, India, 2IIT Bombay, India and 3Indian Statistical Institute, India
|
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
[ Pdf ]
P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra University, India
|
User Authentication using Native Language Passwords
[ Pdf ]
Sreelatha Malempati1 and Shashi Mogalla2, 1R.V.R. & J.C. College of Engineering, India and 2Andhra University College of Engineering, India
|
Prediction of Malicious Objects in Computer Network and Defense
[ Pdf ]
Hemraj Sainia1, T. C. Panda2 and Minaketan Panda3, 1Alwar Institute of Engineering & Technology, India, 2Orissa Engineering College, India and 3SPANCO TELE, India
|
Blind Signature Scheme Based on Chebyshev Polynomials
[ Pdf ]
Maheswara Rao Valluri, Salalah College of Technology, Oman
|
Efficient Detection of Sybil attack Based on Cryptography in Vanet
[ Pdf ]
Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran
|
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
[ Pdf ]
Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India
|
Experimenting with the Novel Approaches in Text Steganography
[ Pdf ]
Shraddha Dulera1, Devesh Jinwala1 and Aroop Dasgupta2, 1S V National Institute of Technology, India and 2Bhaskaracharya Institute for Space Applications and Geo-Informatics, India
|
Techniques and Tools for Forensic Investigation of E-mail
[ Pdf ]
M. Tariq Banday, University of Kashmir, India
|
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm
[ Pdf ]
S.G.Srikantaswamy1 and H.D.Phaneendra2, 1National Institute of Engineering - Mysore, India and 2 CSE NIE - Mysore, India
|
An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS
[ Pdf ]
K.Kuppusamy1 and S.Malathi2, 1Alagappa University, India and 2Manonmaniam Sundaranar University, India
|
Securing Mobile Agents in MANET against Attacks using Trust
[ Pdf ]
Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India
|
Information Security Synthesis in Online Universities
[ Pdf ]
Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA |
A Multiple Ballots Election Scheme Using Anonymous Distribution
[ Pdf ]
Manabu Okamoto, Kanagawa Institute of Technology, Japan |
Enhanced Secure Algorithm for Message Communication
[ Pdf ]
Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India |
Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
[ Pdf ]
Vikram Singh and Vatika, Chaudhary Devi Lal University, India |
An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users
[ Pdf ]
Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand |
Simulation of the Combined Method
[ Pdf ]
Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia |
Prevention of Wormhole Attack in Wireless Sensor Network
[ Pdf ]
Dhara Buch1 and Devesh Jinwala2, 1Government Engineering College Rajkot, India and 2S.V. National Institute of Technology, India |
DDNFS: a Distributed Digital Notary File System
[ Pdf ]
Alexander Zanger, Bond University, Australia |
Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN
[ Pdf ]
R.Seshadri1 and N..Penchalaiah2, 1S.V.University, India and 2ASCET, India |
Handwritten Text Image Authentication Using Back Propagation
[ Pdf ]
A S N Chakravarthy1, Penmetsa V Krishna Raja2 and P S Avadhani3, 1Sri Aditya Engineering College, India, 2JNTUK, India and 3Andhra University, India |
A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks
[ Pdf ]
Hossein Jadidoleslamy, The University of Guilan, Iran |
BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks
[ Pdf ]
Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria |
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
[ Pdf ]
Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi, GLS Institute of Computer Technology, India |
Special Issue on "CNSA 2011" |
Botnet Command Detection using Virtual Honeynet
[ Pdf ]
J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India |
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
[ Pdf ]
L.Kavisankar and C.Chellappan, Anna University, India |
Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks usingReed Solomon Code for Key Predistribution
[ Pdf ]
Pinaki Sarkar1 and Aritra Dhar2, 1Jadavpur University, India and 2Gurunanak Institute of Technology, India |
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography
[ Pdf ]
G.Geetha1 and C.Jayakumar2, 1Jerusalem college of Engineering, India and 2RMK Engineering college, India |
Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism
[ Pdf ]
Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela, India |
Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET
[ Pdf ]
V. Anjana Devi1 and R. S. Bhuvaneswaran2, 1St. Joseph's College of Engineering, India and 2Anna University, India |
Error Detection and Correction for Distributed Group Key Agreement Protocol
[ Pdf ]
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India |
Novel Hybrid Intrusion Detection System
For Clustered Wireless Sensor Network
[ Pdf ]
Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen, Algeria |
Wavelet Thresholding Approach For Image
Denoising
[ Pdf ]
Pankaj Hedaoo and Swati S Godbole, G. H. Raisoni College of Engineering, Nagpur, India. |
Architecture Of A Identity Based Firewall
System
[ Pdf ]
Nenad Stojanovski1 and Marjan Gusev2, 1Makedonski Telekom AD, Orce Nikolov BB, 1000 Skopje, Macedonia and 2Ss. Cyril and Methodius University, Macedonia |
Cryptovirology: Virus Approach [ Pdf ]
Shivale Saurabh Anandrao, Vishwakarma Institute Of Information Technology - Pune, India |
Security Apprehensions In Different Regions Of Cloud Captious Grounds
[ Pdf ]
Gurdev Singh1 Amit Sharma1 and Manpreet Singh Lehal2, 1Eternal University, HP India and 2Lyallpur Khalsa College, Punjab India |
A Novel Header Matching Algorithm For Intrusion Detection Systems
[ Pdf ]
Mohammad A. Alia1, Adnan A. Hnaif1, Hayam K. Al-Anie1, Khulood Abu Maria1, Ahmed M. Manasrah2 and M. Imran Sarwar3, 1Al Zaytoonah University, Jordan, 2Al Yarmouk University, Jordon and 3Universiti Sains Malaysia, Malaysia |
A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing
[ Pdf ]
S.S. Prasad, Rithika Baruah and Siddharth.A, National Institute of Technology, Jamshedpur, India |
E-Voting Protocol Based On Public-Key
Cryptography
[ Pdf ]
Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif, Al Zaytoonah University, Jordan |
Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using Various Optimization Techniques As Well As Network Management Models Giving Special Emphasis To Attack Tree Model
[ Pdf ]
Prabhat Kumar Vishwakarma, University of Gondar, Ethiopia |
Governing Information Security In Conjunction With Cobit And Iso 27001
[ Pdf ]
Tolga Mataracioglu1 and Sevgi Ozkan2, 1TUBITAK National Research Institute of Electronics and Cryptology (UEKAE), Turkey and 2Middle East Technical University, Turkey |
An Evaluation Of Fingerprint Security Using Noninvertible Biohash
[ Pdf ]
N.Radha1 and S.Karthikeyan2, 1Karpagam University, India and 2College of Applied Sciences, Sultanate of Oman |
RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
[ Pdf ]
R. Ramesh and S. Gayathri, Anna University, India |
An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of
Encryption On Mac Layer [ Pdf ]
Gulshan Kumar and Mritunjay Rai, Lovely Professional University, Jalandhar, India. |
An Ancient Indian Board Game as a Tool for Authentication [ Pdf ]
Sreelatha Malempati1 and Shashi Mogalla2, 1RVR & JC College of Engineering, Guntur, A.P and 2Andhra University College of Engineering, Visakhapatnam, A.P |
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption [ Pdf ]
Jeyamala Chandrasekaran1 Subramanyan B1 and Raman G.S2, 1Thiagarajar College of Engineering, Madurai and 2KLN College of Information Technology, Madurai |
System Dynamics Based Insider Threats Modeling [ Pdf ]
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China |
Countermeasure Tool - Carapace for Network Security [ Pdf ]
Anand Bisen, Shrinivas Karwa and B.B. Meshram, Veermata Jijabai Technological Institute, India |
On Design of PUF-Based Random Number Generators [ Pdf ]
Mehdi Ayat1, Reza Ebrahimi Atani2 and Sattar Mirzakuchaki1, 1Iran University of Science and Technology, Iran and 2The University of Guilan, Iran |
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment [ Pdf ]
Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India |
Data Security Using Private Key Encryption System Based on Arithmetic Coding [ Pdf ]
Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India |
PKI in Government Identity Management Systems [ Pdf ]
Ali M. Al-Khouri, Emirates Identity Authority, United Arab Emirates |
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN [ Pdf ]
Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi Pradhan, NM Institute of Engineering and Technology, India |
Authentication Schemes for Session Passwords Using Color and Images [ Pdf ]
M Sreelatha1, M Shashi2, M Anirudh1, Md Sultan Ahamer1 and V Manoj Kumar1, 1RVR & JC College of Engineering, India and 2Andhra University College of Engineering, India |
Transformation from Identity Stone Age to Digital Identity [ Pdf ]
Mohit Kohli, Rolta Technology Limited (RIL), India |
Enterprise Delegation for Service Based Systems [ Pdf ]
Coimbatore Chandersekaran1 and William R. Simpson2, 1The Secretary of the Air Force, USA and 2The Institute for Defense Analyses, USA |
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification [ Pdf ]
Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of Technology - Guwahati, India |
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks [ Pdf ]
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India |
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET [ Pdf ]
Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt |
A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks [ Pdf ]
Mohammed Mana1, Mohammed Feham1 and Boucif Amar Bensaber2, 1University of Tlemcen, Algeria and 2Universite du Quebec a Trois-Rivieres, Canada |
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards [ Pdf ]
Ashok Kumar Das, International Institute of Information Technology - Hyderabad, India |
Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable-Length Key [ Pdf ]
Sabyasachi Samanta1, Saurabh Dutta2 and Goutam Sanyal3, 1Haldia Institute of Technology, India, 2Dr. B. C. Roy Engineering College - Durgapur, India and 3National Institute of Technology - Durgapur, India |
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations [ Pdf ]
Harry Yosh, HECO Ltd - Canberra, Australia
|
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System [ Pdf ]
Renuka Prasad.B1, Annamma Abraham2, Abhas Abhinav3, Sunil.V.Gurlahosur4 and Srinivasa Y4, 1R.V.College of Engineering, India, 2BMSIT - Bengaluru, India, 3DeepRootLinux Pvt Ltd, India, 4SIT - Tumkur, India |
Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel [ Pdf ]
Raju Singh and A.K.Vatsa, Shobhit University, India. |
Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience [ Pdf ]
C Singh, L Singh and E Marks, University of Guyana |
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption [ Pdf ]
Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of Technology - Durgapur, India |
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password [ Pdf ]
Tanmay Bhattacharya1, Sirshendu Hore2, Ayan Mukherjee3 and S. R. Bhadra Chaudhuri4, 1JIS College Engineering, India, 2Hooghly Engineering & Technology College, India, 3Institute of Science & Technology, India and 4Bengal Engineering & Science University, India |
Replication Attack Mitigations for Static And Mobile WSN [ Pdf ]
V.Manjula and C.Chellappan, Anna University - Chennai, India |
Stage Staffing Scheme for Copyright Protection In Multimedia [ Pdf ]
Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology - Guwahati, India |
Substitution-diffusion based Image Cipher [ Pdf ]
Narendra K Pareek1, Vinod Patidar2 and Krishan K Sud2, 1M L Sukhadia University - Udaipur, India and 2Sir Padampat Singhania University, India |
A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers [ Pdf ]
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India |
Image Encryption Based On Diffusion And Multiple Chaotic Maps [ Pdf ]
G.A.Sathishkumar1, K.Bhoopathy bagan2 and N.Sriraam3, 1Sri Venkateswara College of Engineering, India, 2Madras Institute of Technology, India and 3SSN College of Engineering, India |
A QoS Based MAC Protocol For Wireless Ad-hoc Network [ Pdf ]
Vandana khare1, D.SrinivasRao2 and Y.Madhavee Latha3, 1CMEC - Hyd, India, 2JNTUH - Hyd, India and 3MRECW - Hyd, India |
Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options [ Pdf ]
Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA |
Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic Algorithm For VOIP [ Pdf ]
Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University Teknologi Malaysia, Malaysia |
An Overview Of The Security Concerns In Enterprise Cloud Computing [ Pdf ]
Anthony Bisong1 and Syed (Shawon) M. Rahman2, 1Capella University,USA and 2University of Hawaii-Hilo, USA |
A Human-Centric Approach To Group-Based Context-Awareness [ Pdf ]
Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, University of Isfahan, Iran |
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector [ Pdf ]
Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK |
Failure of A Mix Network [ Pdf ]
Kun Peng, Institute for Infocomm Research, Singapore |
Analysis of Web Logs And Web User In Web Mining [ Pdf ]
L.K. Joshila Grace1, V.Maheswari1 and Dhinaharan Nagamalai2, 1Sathyabama University, India and 2Wireilla Net Solutions PTY Ltd, Australia |
|
IJNSA is listed in ERA 2012 as per the Australian Research Council (ARC) Journal Ranking. New
|