International Journal of Network Security & Its Applications (IJNSA)

Volume 6

November 2014, Volume 6, Number 6

A Cryptographic Mutual Authentication Scheme for Web Applications
Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division
Sumana M1 and Hareesha K S2, 1M S Ramaiah Institute of Technology, India and 2Manipal Institute of Technology, India
Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information Systems)
Hani Qusa, University College of Applied Science, Palestine
Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts
Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India
Key Management Techniques in Wireless Sensor Networks
Khawla Naji Shnaikat1 and Ayman Ahmed AlQudah2, 1University of Jordan, Jordan and 2University of Dammam, KSA

September 2014, Volume 6, Number 5

A Secure Electronic Payment Protocol for Wireless Mesh Networks
Helen Cheung and Cungang Yang, Ryerson University, Canada
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection
Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India
Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation
Peter Mell1 and Richard Harang2, 1National Institute of Standards and Technology, USA and 2U.S. Army Research Laboratory,
A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports
Hamsha and Nagaraj, RVCE Bangalore, India
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
Waqas Aman, Gjovik University College, Norway
Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review
Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere UniversityKampala, Uganda

July 2014, Volume 6, Number 4

End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc Networks.
Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA
Analysis of RSA Algorithm using GPU Programming
Sonam Mahajan and Maninder Singh, Thapar University, India
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria
Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering Pune, India
State of Mobile Banking in Tanzania and Security Issues
Bossi Masamila, Dublin Institute of Technology, Ireland
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University of Khartoum, Sudan

May 2014, Volume 6, Number 3

Privacy Protection for Role-Based Access Control in Service Oriented Architecture
Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada
Survey of Manet Misbehaviour Detection Approaches
Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India
Attack Graph-Based Risk Assessment and Optimisation Approach
Mohammed Alhomidi and Martin Reed, University of Essex, UK
Security Issues Associated with Big Data in Cloud Computing
Venkata Narasimha Inukollu1 , Sailaja Arsi1 and Srinivasa Rao Ravuri2, 1Texas Tech University, USA and 2Cognizant
Technology Solutions, India
A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations
FuiFui Wong and Cheng Xiang Tan, TongJi University, China
Role of Integrated Virtual E-Learning System for Distance Learning Students
Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology for Women, India
Self-Protection Mechanism For Wireless Sensor Networks
Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India

March 2014, Volume 6, Number 2

The Impact of Management Information systems(MIS) Technologies on the quality of Services provided at the University
Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan
Enhancing the Impregnability of Linux Servers
Rama Koteswara Rao G1, Satya Prasad R2, Pathanjali Sastri A2 and P.E.S.N. Prasad1, 1Prasad V. Potluri Siddhartha
Institute of Technology, India and 2Acharya Nagarjuna University, India
Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To Exploit Diversity
Swati Chowdhuri1, Santanu Maiti1, Sheli Sinha Chaudhuriand2 and P.K.Baneerjee2, 1Seacom Engineering College, India
and 2Jadavpur University, India
A New Hybrid Algorithm for Business Intelligence Recommender System
P.Prabhu and N.Anbazhagan, Alagappa University, India

January 2014, Volume 6, Number 1

Optimised Malware Detection in Digital Forensics
SaeedAlmarri1 and Paul Sant2, 1University of Bedfordshire, United Kingdom and 2University Campus Milton Keynes,
United Kingdom
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach
Shadi R. Masadeh1, Ahmad Azzazi2, Bassam A. Y. Alqaralleh3 and Ali, Mousa.Al Sbou3, 1Isra University, Jordan,
2Applied Science University, Jordan and 3Al-Hussein Bin Talal University, Jordan
Cloud Computing and Security Issues in the Cloud
Monjur Ahmed1 and Mohammad Ashraf Hossain2, 1Daffodil Institute of IT, Bangladesh and 2Freelance IT Consultant,
A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service Oriented Architecture
Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University, Mashhad, Iran
SPARQL: Semantic Information Retrieval by Embedding Prepositions
Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University, India
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for Electronic Commerce Transactions and
Fahad A Alqahtani, De Montfort University, United Kingdom
An IAC Approach for Detecting Profile Cloning in Online Social Networks
MortezaYousefi Kharaji1 and FatemehSalehi Rizi2, 1Mazandaran University of Science and Technology, Iran
and 2Sheikhbahaee University of Isfahan, Iran
Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares
Pallavi Vijay Chavan1, Mohammad Atique2 and Latesh Malik1, 1GHRCE - Nagpur, India and 2SGBAU -Amravati, India