COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

International journal of Network Security & Its Applications

ISSN : 0974 - 9330[Online]; 0975 - 2307[Print]

November 2014, Volume 6. Number 6

A Cryptographic Mutual Authentication Scheme for Web Applications [Pdf]
Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division [Pdf]
Sumana M1 and Hareesha K S2, 1M S Ramaiah Institute of Technology, India and 2Manipal Institute of Technology, India
Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information Systems) [Pdf]
Hani Qusa, University College of Applied Science, Palestine
Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts [Pdf]
Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India
Key Management Techniques in Wireless Sensor Networks [Pdf]
Khawla Naji Shnaikat1 and Ayman Ahmed AlQudah2, 1University of Jordan, Jordan and 2University of Dammam, KSA

September 2014, Volume 6. Number 5

A Secure Electronic Payment Protocol for Wireless Mesh Networks [Pdf]
Helen Cheung and Cungang Yang, Ryerson University, Canada
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection [Pdf]
Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India
Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation [Pdf]
Peter Mell1 and Richard Harang2, 1National Institute of Standards and Technology, USA and 2U.S. Army Research Laboratory, USA
A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports [Pdf]
Hamsha and Nagaraj, RVCE Bangalore, India
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools [Pdf]
Waqas Aman, Gjovik University College, Norway
Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review [Pdf]
Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere UniversityKampala, Uganda

July 2014, Volume 6. Number 4

End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc Networks[Pdf]
Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA
Analysis of RSA Algorithm using GPU Programming [Pdf]
Sonam Mahajan and Maninder Singh, Thapar University, India
Evaluation of Enhanced Security Solutions in 802.11-Based Networks [Pdf]
Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria
Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features[Pdf]
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering Pune, India
State of Mobile Banking in Tanzania and Security Issues [Pdf]
Bossi Masamila, Dublin Institute of Technology, Ireland
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images [Pdf]
El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University of Khartoum, Sudan

May 2014, Volume 6. Number 3

Privacy Protection for Role-Based Access Control in Service Oriented Architecture [Pdf]
Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada
Survey of Manet Misbehaviour Detection ApproachesPdf ]
Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India
Attack Graph-Based Risk Assessment and Optimisation ApproachPdf ]
Mohammed Alhomidi and Martin Reed, University of Essex, UK
Security Issues Associated with Big Data in Cloud ComputingPdf ]
Venkata Narasimha Inukollu1 , Sailaja Arsi1 and Srinivasa Rao Ravuri21Texas Tech University, USA and 2Cognizant Technology Solutions, India
A Survey of Trends in Massive DDOS Attacks and Cloud-Based MitigationsPdf ]
FuiFui Wong and Cheng Xiang Tan, TongJi University, China
Role of Integrated Virtual E-Learning System for Distance Learning StudentsPdf ]
Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology for Women, India
Self-Protection Mechanism For Wireless Sensor NetworksPdf ]
Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran
Selective Jamming Attack Prevention Based on Packet Hiding Methods and WormholesPdf ]
Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India

March 2014, Volume 6. Number 2

The Impact of Management Information systems(MIS) Technologies on the quality of Services provided at the university of TABUK [Pdf]
Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan
Enhancing the Impregnability of Linux ServersPdf ]
Rama Koteswara Rao G1, Satya Prasad R2, Pathanjali Sastri A2 and P.E.S.N. Prasad11Prasad V. Potluri Siddhartha Institute of Technology, India and 2Acharya Nagarjuna University, India
Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To Exploit DiversityPdf ]
Swati Chowdhuri1, Santanu Maiti1, Sheli Sinha Chaudhuriand2 and P.K.Baneerjee2, 1Seacom Engineering College, India and 2Jadavpur University, India
A New Hybrid Algorithm for Business Intelligence Recommender System Pdf ]
P.Prabhu and N.Anbazhagan, Alagappa University, India

January 2014, Volume 6. Number 1

Optimised Malware Detection in Digital Forensics [ Pdf ]
SaeedAlmarri1 and Paul Sant2, 1University of Bedfordshire, United Kingdom and 2University Campus Milton Keynes, United Kingdom
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach [ Pdf ]
Shadi R. Masadeh1, Ahmad Azzazi2, Bassam A. Y. Alqaralleh3 and Ali, Mousa.Al Sbou3, 1Isra University, Jordan, 2Applied Science University, Jordan and 3Al-Hussein Bin Talal University, Jordan
Cloud Computing and Security Issues in the Cloud [ Pdf ]
Monjur Ahmed1 and Mohammad Ashraf Hossain2, 1Daffodil Institute of IT, Bangladesh and 2Freelance IT Consultant, Bangladesh.
A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service Oriented Architecture [ Pdf ]
Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University, Mashhad, Iran
SPARQL: Semantic Information Retrieval by Embedding Prepositions [ Pdf ]
Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University, India
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for Electronic Commerce Transactions & Payments [Pdf]
Fahad A Alqahtani, De Montfort University, United Kingdom
An IAC Approach for Detecting Profile Cloning in Online Social Networks [ Pdf ]
MortezaYousefi Kharaji1 and FatemehSalehi Rizi2, 1Mazandaran University of Science and Technology, Iran and 2Sheikhbahaee University of Isfahan, Iran
Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares [ Pdf ]
Pallavi Vijay Chavan1, Mohammad Atique2 and Latesh Malik1, 1GHRCE - Nagpur, India and 2SGBAU -Amravati, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN