COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

International journal of Network Security & Its Applications

ISSN : 0974 - 9330[Online]; 0975 - 2307[Print]

 

July 2010, Volume 2. Number 3

A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords [ pdf ]
Dhananjay Kulkarni, Boston University, USA.

Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next Generation High Rate WPAN pdf ]
Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of Electronics and Telecommunications of Rennes (IETR),France.

Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers [ pdf ]
Chang N. Zhang, Qian Yu and Xiao Wei Liu, University of Regina, Canada.

Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs [ pdf ]
Theodore Zahariadis1, Helen Leligou1, Panagiotis Karkazis5,Panagiotis Trakadas2, Ioannis Papaefstathiou5,Charalambos Vangelatos3 and Lionel Besson4, 1 Technological Educational Institute of Chalkis, Greece,2 Hellenic Authority for Communications Security and Privacy (ADAE), Greece,3 Hellenic Aerospace Industry S.A., Greece,4 Thales Communications, France and 5 Technical University of Crete, Greece.

Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics Timers [ pdf ]
Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant, University of Mauritius.

Improving TLS Security By Quantum Cryptography pdf ]
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi3, 1FSO, University Mohamed Ist, Morocco,2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco.

Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network [ pdf ]
Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2, 1Stamford University ,Bangladesh and 2American International University,Bangladesh.

Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network [ pdf ]
S. Albert Raebra1 and S.Vijayalakshmi2, 1St.Josephs College, Bharathidasan University,India and 2Pondicherry University,India.

An Efficient IP Traceback Through Packet Marking Algorithm pdf ]
Y.Bhavani and P.Niranjan Reddy,Kakatiya Institute of Technology and Science,India.

Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment  [ pdf ]
K R Chandrasekhara Pillai1 and M P Sebastian2, 1N S S College of Engineering,India and 2Indian Institute of Management,India.

Wireless Security Measurement Using Data Value Indexpdf ]
Reza Amirpoor, 1Ajay Kumar 2 and Satish R. Deavne 3,1Bharati Vidyapeeth University,India,2JSPMs JAYAWANT Institute of Computer Applications,India and 3DR.D. Y. Patil Ramrao Adik Institute of Technology,India.

An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error Concealment [ pdf ]
Amit Phadikar1 and Santi P. Maity 2, 1MCKV Institute of Engineering,India and 2Bengal Engineering and Science University,India.

Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services [ pdf ]
Urjita Thakar1, Nirmal Dagdee2 and Sudarshan Varma3, 1Shri G.S. Institute of Technology and Science,India,2S.D. Bansal College of Technology,India and 3Ideavate Solutions, USA.

April 2010, Volume 2. Number 2

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem pdf ]
Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology, Guwahati, India

Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection pdf ]
Dewan Md. Farid1, Nouria Harbi1, and Mohammad Zahidur Rahman2, 1University Lumiere Lyon 2 - France and 2Jahangirnagar University, Bangladesh

Lightweight Mutual Authentication Protocol for Low Cost RFID Tags pdf ]
Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, EGYPT

Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS  [ pdf ]
S.Sangeetha1 & V.Vaidehi2, 1Angel College of Engineering, India and 2Madras Institute of Technology, India

Events Classification in Log Audit pdf ]
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait

A Survey on Trust Management for Mobile Ad Hoc Networks  [ pdf ]
K.Seshadri Ramana1, A.A. Chari2 and N.Kasiviswanth1,1G.Pulla Reddy Engineering College, India and 2Rayalaseema University, India.

Analysis of the Security of BB84 by Model Checkingpdf ]
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi13, 1FSO, University Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco

Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor [ pdf ]
Mohsen Machhout1, Zied Guitouni1, Kholdoun Torki2, Lazhar Khriji3 and Rached Tourki1, 1Faculty of Sciences of Monastir, Tunisia,2TIMA - CMP Laboratory, France and 3Sultane Qaboos University, Oman

Impersonation Attack on EKE Protocol [ pdf ]
Shirisha Tallapally , Vaagdevi College of Engineering, India

A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy-Constrained Devices [ pdf ]
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore

Trust Based Content Distribution for Peer-To-Peer Overlay Networks [ pdf ]
S.Ayyasamy1 and S.N. Sivanandam2, 1Tamilnadu College of Engineering, India and 2PSG College of Technology, India

Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET  [ pdf ]
T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology, Sathyamangalam,India


Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)pdf ]
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France


January 2010, Volume 2. Number 1

Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks [ pdf ]
James Cannady, Nova Southeastern University, USA

A Frame Work for Ontological Privacy Preserved Mining pdf ]
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch, VIT University, India.

Workload Characterization of Spam Email Filtering Systems [ pdf ]
Yan Luo, University of Massachusetts Lowell, USA

Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Mediapdf ]
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA

Weakness on Cryptographic Schemes Based on Regular LDPC Codes [ pdf ]
Omessaad Hamdi1 , Manel abdelhedi2, Ammar Bouallegue2 and Sami Harari3, 1SYSTEL, SUPCOM, Tunisia, 2SYSCOM, ENIT, Tunisia and 3SIS, USTV, France.

Advanced Security Management in Metro Ethernet Networks [ pdf ]
Ammar Rayes, Cisco Systems, USA

Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application [ pdf ]
1Syed S. Rizvi, 2Aasia Riasat and 3Khaled M. Elleithy,1, 3University of Bridgeport, USA and 2Institute of Business Management, Pakistan.

Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architecturespdf ]
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN