|
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks [ Pdf ]
Merad Boudia Omar Rafik and Feham Mohamed, University of Tlemcen, Algeria |
Secured RFID Mutual Authentication Scheme for Mifare Systems [ Pdf ]
Kuo-Tsang Huang and Jung-Hui Chiu, Chang Gung University, Taiwan |
Malware Detection, Supportive Software Agents and Its Classification Schemes [ Pdf ]
Adebayo, Olawale Surajudeen1, M.A. Mabayoje2, Amit Mishra3 and Osho Oluwafemi1, 1Federal University of Technology, Nigeria, 2University of Ilorin, Nigeria and 3IBB University Lapai, Nigeria |
Mining Techniques in Network Security to Enhance Intrusion Detection Systems [ Pdf ]
Maher Salem and Ulrich Buehler, University of Applied Sciences, Germany |
A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel [ Pdf ]
Abudhahir Buhari1, Zuriati Ahmad Zukarnain1, Shamala K. Subramaniam1 , Hisham Zainuddin1 and Suhairi Saharudin2, 1University Putra Malaysia, Malaysia and 2MIMOS - Technology Park Malaysia, Malaysia |
Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker [ Pdf ]
Manu S. Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India |
The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS [ Pdf ]
John Tengviel1, K. Diawuo2 and K. A. Dotche2, 1Sunyani Polytechnic, Ghana and 2KNUST Kumasi, Ghana |
Wireless Public Key Infrastructure for Mobile Phones [ Pdf ]
Balachandra Muniyal, Krishna Prakash and Shashank Sharma, Manipal University, India |
Secure Key Management Protocol in WIMAX [ Pdf ]
Noudjoud Kahya1, Nacira Ghoualmi1 and Pascal Lafourcade2, 1Badji Mokhtar University, Algeria and 2Joseph Fourier University, France |
A Novel Multipoint Relay based Secure Routing in MANET [ Pdf ]
Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee, IEM KolaKata, India |
Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique [ Pdf ]
Oluwafemi Oriola, Adesesan B. Adeyemo and Oluwaseyitanfunmi Osunade, University of Ibadan, Nigeria |
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography [ Pdf ]
Arpita Sarkar and Sachin Tripathi, Indian School of Mines Dhanbad, India |
Review on IPv6 Security Vulnerability Issues and Mitigation Methods [ Pdf ]
Supriyanto1, Raja Kumar Murugesan2 and Sureswaran Ramadass3, 1Universitas Sultan Ageng Tirtayasa, Indonesia, 2Taylor's University, Malaysia and 3National Advanced IPv6 Centre (NAv6) Universiti Sains, Malaysia |
Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution [ Pdf ]
Abudhahir Buhari1, Zuriati Ahmad Zukarnain1, Shamala K. Subramaniam1, Hisham Zainuddin1 and Suhairi Saharudin2, 1University Putra Malaysia, Malaysia and 2Technology Park Malaysia, Malaysia |
Comparison of High Speed Congestion Control Protocols [ Pdf ]
Jawhar Ben Abed1, Laarif Sinda2, Mohamed Ali Mani3 and Rachid Mbarek2, 1Polytech Sousse, 2ISITCOM Hammam Sousse and 3ISTLS Sousse, Tunisia |
Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts [ Pdf ]
Priyanka Dey and Suparna Biswas, West Bengal University, India
|
A Framework For Performance Evaluation Of ASIPs in Network-Based IDS [ Pdf ]
Majid Nezakatolhoseini1 and Mohammad Amin Taherkhani2, 1Science and Research Branch Islamic Azad University, Iran and 2Shahid Beheshti University, Iran |
Design And Validation Of Specification Based Ids For Power Enhancement Related Vulnerabilities In AODV [ Pdf ]
Chaitali Biswas Dutta and Utpal Biswas, University of Kalyani, India |
Security V/S Qos for LTE Authentication and Key Agreement Protocol [ Pdf ]
Jacques Bou Abdo1, Jacques Demerjian2 and Hakima Chaouchi3, 1Nokia Siemens Networks, Lebanon, 2Antonine University, Lebanon and 3Telecom Sud Paris, France |
Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and Acquisition of Companies [ Pdf ]
Balachandra Muniyal1, Prema K.V2 and Mamatha Balachandra1, 1Manipal University, India and 2Modi Institute of Technological Sciences, India |
Healthcare IT: Is Your Information At Risk? [ Pdf ]
Kimmarie Donahue1 and Syed (Shawon) M. Rahman2, 1San Antonio, USA and 2Capella University, USA |
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications [ Pdf ]
H.Jayasree1 and A.Damodaram2, 1ATRI, India and 2JNTUH - Kukatpally, India |
A Survey on Web Spam Detection Methods: Taxonomy [ Pdf ]
Shekoofeh Ghiam1 and Alireza Nemaney Pour2, 1Sharif University of Technology, Iran and 2Islamic Azad University of Abhar, Iran |
Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network [ Pdf ]
Amol Vasudeva1 and Manu Sood2, 1Jaypee University of Information Technology, India and 2Himachal Pradesh University, India |
A Simple and Reliable Touch Sensitive Security System [ Pdf ]
Adamu Murtala Zungeru1, Jonathan Gana Kolo1 and Ijarotimi Olumide2, 1University of Nottingham, Malaysia and 2Rufus Giwa Polytechnic, Nigeria |
Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer Network [ Pdf ]
Prashant Kumar Singh1, A. K. Vatsa1, Reetu Sharma2 and Priyanka Tyagi3, 1Shobhit University, India, 2CERT, India and 3DVSIET, India |
Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM System with Implementation of Concatenated ECB and CFB Cryptographic Algorithm [ Pdf ]
Laila Naznin,Shahrina Sultana, M. Golam Rashed and Shaikh Enayet Ullah, University of Rajshahi, Bangladesh |
Explore Ten Different Types of Software Engineering Principles [ Pdf ]
S.Thulasee Krishna1, S.Sreekanth1, B. Bhaskar1 and N.Pavan Kumar2, 1Kuppam Engineering College, India and 2Sitams,Chittoo(DT), India |
Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining Replication and Diversity [ Pdf ]
Charles A. Kamhoua1, Patrick Hurley1, Kevin A. Kwiat1 and Joon S. Park2, 1Air Force Research Laboratory - Information Directorate, USA and 2Syracuse University, USA |
Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP [ Pdf ]
Abdullah AlOtaibi and Hamza Aldabbas, De Montfort University, United Kingdom |
Evaluation of Security Attacks on UMTS Authentication Mechanism [ Pdf ]
Mojtaba Ayoubi Mobarhan, Mostafa Ayoubi Mobarhan and Asadollah Shahbahrami, University of Guilan, Iran |
Non-Profit Organizations' Need to Address Security for Effective Government Contracting [ Pdf ]
Lee E. Rice1 and Syed (Shawon) M. Rahman1,2, 1Capella University,USA and 2University of Hawaii-Hilo, USA |
A Novel Energy Efficient and Administrator Based Secured Routing in MANET [ Pdf ]
Himadri Nath Saha1, Debika Bhattacharyya1 and P. K.Banerjee2, 1Institute of Engineering and Management West Bengal, India and 2Jadavpur university, India |
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile [ Pdf ]
S.Karthika, A.Kiruthiga And S.Bose, Anna University, India |
How to Avoid the N-1 Attack Without Costly Implementations [ Pdf ]
David Tinoco Varela, Universidad Nacional Autonoma de Mexico, Mexico |
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security [ Pdf ]
Manas Paul1 and Jyotsna Kumar Mandal2, 1JIS College of Engineering, India and 2Kalyani University, India |
Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System [ Pdf ]
TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar, King Fahd University of Petroleum & Minerals(KFUPM), Saudi Arabia |
A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping Binary Exponential Backoff IEEE 802.15.4 [ Pdf ]
Archit Verma Pushpinder Singh Patheja and Akhilesh Waoo, BIST Bhopal, India |
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks [ Pdf ]
A. Forootaninia1 and M. B. Ghaznavi-Ghoushchi2, 1Tehran University, Iran and 2Shahed University, Iran |
Personal Safety Triggering System on Android Mobile Platform [ Pdf ]
Ashokkumar Ramalingam, Prabhu Dorairaj and Saranya Ramamoorthy, Blekinge Institute of Technology, Sweden |
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks [ Pdf ]
Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Middlesex University, UK |
Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs with the Theory of Games [ Pdf ]
Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar |
Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems [ Pdf ]
Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse Toulouse, France |
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks [ Pdf ]
Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and Technology Noida, India |
Security Threats Analysis in Bluetooth-Enabled Mobile Devices [ Pdf ]
Robayet Nasim, University of Science & Technology Chittagong, Bangladesh |
Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under Water Acoustic Sensor Networks [ Pdf ]
Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of Engineering Chennai, India |
The New Age of Computer Virus and Their Detection [ Pdf ]
Nitesh Kumar Dixit1, Lokesh mishra2, Mahendra Singh Charan1 and Bhabesh Kumar Dey1, 1BIET Sikar, India and 2NCAC Sikar, India |
Provable Secure Identity Based Signcryption Schemes without Random Oracles [ Pdf ]
Prashant Kushwah1 and Sunder Lal2, 1Banasthali University, India and 2Veer Bahadur Singh Purvanchal University, India |
Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation [ Pdf ]
P. Devaki and G. Raghavendra Rao, NIE Mysore, India |
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection [ Pdf ]
P.Natesan and P.Balasubramanie, Kongu Engineering College, India |
A Generic Framework for Device Pairing in Ubiquitous Computing Environments
[ Pdf ]
Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja, University of Sussex, UK |
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
[ Pdf ]
Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India |
Cross Layer Intrusion Detection System for Wireless Sensor Network
[ Pdf ]
Djallel Eddine Boubiche and Azeddine Bilami, LaSTIC Laboratory - UHL Batna, Algeria |
Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender Mail Server [ Pdf ]
Alireza Nemaney Pour1, Raheleh Kholghi2 and Soheil Behnam Roudsari2, 1Islamic Azad University of Abhar, Iran and 2Sharif University of Technology, Iran |
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids [ Pdf ]
G.Jacob Victor1, M Sreenivasa Rao2 and V.CH. Venkaiah3, 1SERP - RD Department, India, 2JNTU - Hyderabad, India and 3CRRao AIMS & CS - Hyderabad, India |
Cloud Computing Security in Business Information Systems
[ Pdf ]
Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Ss. Cyril and Methodius University, Macedonia |
Design and Analysis of a Novel Digital Image Encryption Scheme
[ Pdf ]
Narendra K Pareek, M L Sukhadia University, India |
An Implementation of Intrusion Detection System Using Genetic Algorithm
[ Pdf ]
Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, Shahjalal University of Science and Technology, Bangladesh |
Forensic Analysis of Windows Registry Against Intrusion
[ Pdf ]
Haoyang Xie1, Keyu Jiang1, Xiaohong Yuan2 and Hongbiao Zeng1, 1Fort Hays State University, USA and 2North Carolina A&T State University, USA |
LPM: A Distributed Architecture and Alogorithms for Location Privacy in LBS
[ Pdf ]
Muhamed Ilyas and R. Vijayakumar, Mahatma Gandhi University Kottayam, India |
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
[ Pdf ]
Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar, College of Engineering - Pune, India |
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
[ Pdf ]
R.Santosh Kumar1, C.Narasimham2 and S.Pallam Setty3, 1MVGR College of Engg., India, 2VR Siddhartha Engineering College, India and 3Andhra University, India |
Identification of Image Spam by Using Low Level & Metadata Features
[ Pdf ]
Anand Gupta, Chhavi Singhal and Somya Aggarwal, Netaji Subhas Institute of Technology, India |
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
[ Pdf ]
S. Sree Vivek1, S. Sharmila Deva Selvi1, V. Radhakishan2, C. Pandu Rangan1, 1IIT Madras, India and 2NIT Trichy, India |
Passblot: A Highly Scalable Graphical one Time Password System
[ Pdf ]
Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V Gangashetty, IIIT - Hyderabad, India |
Optimizing One Fair Document Exchange Protocol
[ Pdf ]
Abdullah M. Alaraj, Qassim University, Saudi Arabia
|
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots [ Pdf ]
K.Munivara Prasad1, A.Rama Mohan Reddy2 and V Jyothsna3, 1Rayalaseema University, India, 2SV University, India and 3Sree vidyanikethan Engg.College, India
|
Protected Data Objects Replication in Data Grid [ Pdf ]
G. Aruna Kranthi and D. Shashi Rekha, S.R. Engineering College - Warangal, India
Erratum:Due to a serious case of plagiarism this paper has been retracted.
|
Efficient & Secure Data Hiding Using Secret Reference Matrix [ Pdf ]
Laxman Tawade1, Rajshree Mahajan2 and Chandan Kulthe2, 1Pune University, India and 2Aditya Engineering College, India
|
Risks and Remedies in E-Learning System [ Pdf ]
Nikhilesh Barik and Sunil Karforma, Burdwan University, India
|
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks [ Pdf ]
Priyank Singhal and Nataasha Raul, Sardar Patel Institute of Technology - University of Mumbai, India
|
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc
Network [ Pdf ]
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women, India
|
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks [ Pdf ]
Sridhar Subramanian1 and Baskaran Ramachandran2, 1Easwari Engineering College - Chennai, India and 2Anna University - Chennai, India |
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security [ Pdf ]
Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India |
A Security Suite for Wireless Body Area Networks [ Pdf ]
Raghav V. Sampangi1, Saurabh Dey2, Shalini R. Urs3 and Srinivas Sampalli1, 1Dalhousie University, Canada, 2Analytics Quotient Bangalore, India and 3University of Mysore, India |
A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing [ Pdf ]
G.S. Mamatha, R.V. College of Engineering Bangalore, India |
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine [ Pdf ]
Besma Othmani1, Mohsen Machhout1, Houcine Mejri1,2, Hafedh Belmabrouk1 and Rached Tourki1, 1Laboratoire d'Electronique et Micro Electronique Faculte des Sciences de Monastir, Tunisia and 2Ecole Preparatoire aux Academies Melitaires, Tunisia
|
|
IJNSA is listed in ERA 2012 as per the Australian Research Council (ARC) Journal Ranking. New
|