International journal of Network Security & Its Applications
ISSN : 0974 - 9330[Online]; 0975 - 2307[Print]
July 2010, Volume 2. Number 3
A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords [ pdf ]
Dhananjay Kulkarni, Boston University, USA.
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next Generation High Rate WPAN [ pdf ]
Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of Electronics and Telecommunications of Rennes (IETR),France.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers [ pdf ]
Chang N. Zhang, Qian Yu and Xiao Wei Liu, University of Regina, Canada.
Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs [ pdf ]
Theodore Zahariadis1, Helen Leligou1, Panagiotis Karkazis5,Panagiotis Trakadas2, Ioannis Papaefstathiou5,Charalambos Vangelatos3 and Lionel Besson4, 1 Technological Educational Institute of Chalkis, Greece,2 Hellenic Authority for Communications Security and Privacy (ADAE), Greece,3 Hellenic Aerospace Industry S.A., Greece,4 Thales Communications, France and 5 Technical University of Crete, Greece.
Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics Timers [ pdf ]
Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant, University of Mauritius.
Improving TLS Security By Quantum Cryptography [ pdf ]
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi3, 1FSO, University Mohamed Ist, Morocco,2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco.
Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network [ pdf ]
Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2, 1Stamford University ,Bangladesh and 2American International University,Bangladesh.
Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network [ pdf ]
S. Albert Raebra1 and S.Vijayalakshmi2, 1St.Josephs College, Bharathidasan University,India and 2Pondicherry University,India.
An Efficient IP Traceback Through Packet Marking Algorithm [ pdf ]
Y.Bhavani and P.Niranjan Reddy,Kakatiya Institute of Technology and Science,India.
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment [ pdf ]
K R Chandrasekhara Pillai1 and M P Sebastian2, 1N S S College of Engineering,India and 2Indian Institute of Management,India.
Wireless Security Measurement Using Data Value Index[ pdf ]
Reza Amirpoor, 1Ajay Kumar 2 and Satish R. Deavne 3,1Bharati Vidyapeeth University,India,2JSPMs JAYAWANT Institute of Computer Applications,India and 3DR.D. Y. Patil Ramrao Adik Institute of Technology,India.
An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error Concealment [ pdf ]
Amit Phadikar1 and Santi P. Maity 2, 1MCKV Institute of Engineering,India and 2Bengal Engineering and Science University,India.
Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services [ pdf ]
Urjita Thakar1, Nirmal Dagdee2 and Sudarshan Varma3, 1Shri G.S. Institute of Technology and Science,India,2S.D. Bansal College of Technology,India and 3Ideavate Solutions, USA.
April 2010, Volume 2. Number 2
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem [ pdf ]
Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology, Guwahati, India
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection [ pdf ]
Dewan Md. Farid1, Nouria Harbi1, and Mohammad Zahidur Rahman2, 1University Lumiere Lyon 2 - France and 2Jahangirnagar University, Bangladesh
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags [ pdf ]
Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, EGYPT
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS [ pdf ]
S.Sangeetha1 & V.Vaidehi2, 1Angel College of Engineering, India and 2Madras Institute of Technology, India
Events Classification in Log Audit [ pdf ]
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait
A Survey on Trust Management for Mobile Ad Hoc Networks [ pdf ]
K.Seshadri Ramana1, A.A. Chari2 and N.Kasiviswanth1,1G.Pulla Reddy Engineering College, India and 2Rayalaseema University, India.
Analysis of the Security of BB84 by Model Checking[ pdf ]
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi13, 1FSO, University Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor [ pdf ]
Mohsen Machhout1, Zied Guitouni1, Kholdoun Torki2, Lazhar Khriji3 and Rached Tourki1, 1Faculty of Sciences of Monastir, Tunisia,2TIMA - CMP Laboratory, France and 3Sultane Qaboos University, Oman
Impersonation Attack on EKE Protocol [ pdf ]
Shirisha Tallapally , Vaagdevi College of Engineering, India
A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy-Constrained Devices [ pdf ]
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore
Trust Based Content Distribution for Peer-To-Peer Overlay Networks [ pdf ]
S.Ayyasamy1 and S.N. Sivanandam2, 1Tamilnadu College of Engineering, India and 2PSG College of Technology, India
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET [ pdf ]
T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology, Sathyamangalam,India
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)[ pdf ]
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France
January 2010, Volume 2. Number 1
Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks [ pdf ]
James Cannady, Nova Southeastern University, USA
A Frame Work for Ontological Privacy Preserved Mining [ pdf ]
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch, VIT University, India.
Workload Characterization of Spam Email Filtering Systems [ pdf ]
Yan Luo, University of Massachusetts Lowell, USA
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media[ pdf ]
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA
Weakness on Cryptographic Schemes Based on Regular LDPC Codes [ pdf ]
Omessaad Hamdi1 , Manel abdelhedi2, Ammar Bouallegue2 and Sami Harari3, 1SYSTEL, SUPCOM, Tunisia, 2SYSCOM, ENIT, Tunisia and 3SIS, USTV, France.
Advanced Security Management in Metro Ethernet Networks [ pdf ]
Ammar Rayes, Cisco Systems, USA
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application [ pdf ]
1Syed S. Rizvi, 2Aasia Riasat and 3Khaled M. Elleithy,1, 3University of Bridgeport, USA and 2Institute of Business Management, Pakistan.
Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures[ pdf ]
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon