International journal of Network Security & Its Applications
ISSN : 0974 - 9330[Online]; 0975 - 2307[Print]
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
System Dynamics Based Insider Threats Modeling [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Countermeasure Tool - Carapace for Network Security [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
On Design of PUF-Based Random Number Generators [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Data Security Using Private Key Encryption System Based on Arithmetic Coding [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PKI in Government Identity Management Systems [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Authentication Schemes for Session Passwords Using Color and Images [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Transformation from Identity Stone Age to Digital Identity [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Enterprise Delegation for Service Based Systems [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET [Pdf] |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks [Pdf]
Mohammed Mana1, Mohammed Feham1 and Boucif Amar Bensaber2, 1University of Tlemcen, Algeria and 2Universite du Quebec a Trois-Rivieres, Canada
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards [Pdf]
Ashok Kumar Das, International Institute of Information Technology - Hyderabad, India
Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable-Length Key [Pdf]
Sabyasachi Samanta1, Saurabh Dutta2 and Goutam Sanyal3, 1Haldia Institute of Technology, India, 2Dr. B. C. Roy Engineering College - Durgapur, India and 3National Institute of Technology - Durgapur, India
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations [Pdf]
Harry Yosh, HECO Ltd - Canberra, Australia
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System [Pdf]
Renuka Prasad.B1, Annamma Abraham2, Abhas Abhinav3, Sunil.V.Gurlahosur4 and Srinivasa Y4, 1R.V.College of Engineering, India, 2BMSIT - Bengaluru, India, 3DeepRootLinux Pvt Ltd, India, 4SIT - Tumkur, India
Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel [Pdf]
Raju Singh and A.K.Vatsa, Shobhit University, India.
Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience [Pdf]
C Singh, L Singh and E Marks, University of Guyana
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption [Pdf]
Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of Technology - Durgapur, India
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password [Pdf]
Tanmay Bhattacharya1, Sirshendu Hore2, Ayan Mukherjee3 and S. R. Bhadra Chaudhuri4, 1JIS College Engineering, India, 2Hooghly Engineering & Technology College, India, 3Institute of Science & Technology, India and 4Bengal Engineering & Science University, India
Replication Attack Mitigations for Static And Mobile WSN [Pdf]
V.Manjula and C.Chellappan, Anna University - Chennai, India
Stage Staffing Scheme for Copyright Protection In Multimedia [Pdf]
Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology - Guwahati, India
Substitution-diffusion based Image Cipher [Pdf]
Narendra K Pareek1, Vinod Patidar2 and Krishan K Sud2, 1M L Sukhadia University - Udaipur, India and 2Sir Padampat Singhania University, India
A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers [Pdf]
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India
Image Encryption Based On Diffusion And Multiple Chaotic Maps [Pdf]
G.A.Sathishkumar1, K.Bhoopathy bagan2 and N.Sriraam3, 1Sri Venkateswara College of Engineering, India, 2Madras Institute of Technology, India and 3SSN College of Engineering, India
A QoS Based MAC Protocol For Wireless Ad-hoc Network [Pdf]
Vandana khare1, D.SrinivasRao2 and Y.Madhavee Latha3, 1CMEC - Hyd, India, 2JNTUH - Hyd, India and 3MRECW - Hyd, India
January 2011, Volume 3. Number 1
Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options [ pdf ]
Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA
Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic Algorithm For VOIP [ pdf ]
Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University Teknologi Malaysia, Malaysia
An Overview Of The Security Concerns In Enterprise Cloud Computing [ pdf ]
Anthony Bisong1 and Syed (Shawon) M. Rahman2, 1Capella University,USA and 2University of Hawaii-Hilo, USA
A Human-Centric Approach To Group-Based Context-Awareness [ pdf ]
Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, University of Isfahan, Iran
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector [ pdf ]
Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK
Failure of A Mix Network [ pdf ]
Kun Peng, Institute for Infocomm Research, Singapore
Analysis of Web Logs And Web User In Web Mining [ pdf ]
L.K. Joshila Grace1, V.Maheswari1 and Dhinaharan Nagamalai2, 1Sathyabama University, India and 2Wireilla Net Solutions PTY Ltd, Australia