A Cryptographic Mutual Authentication Scheme for Web Applications [Pdf]
Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco |
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division [Pdf]
Sumana M1 and Hareesha K S2, 1M S Ramaiah Institute of Technology, India and 2Manipal Institute of Technology, India |
Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information Systems) [Pdf]
Hani Qusa, University College of Applied Science, Palestine |
Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts [Pdf]
Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India |
Key Management Techniques in Wireless Sensor Networks [Pdf]
Khawla Naji Shnaikat1 and Ayman Ahmed AlQudah2, 1University of Jordan, Jordan and 2University of Dammam, KSA |
A Secure Electronic Payment Protocol for Wireless Mesh Networks [Pdf]
Helen Cheung and Cungang Yang, Ryerson University, Canada |
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection [Pdf]
Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India |
Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation [Pdf]
Peter Mell1 and Richard Harang2, 1National Institute of Standards and Technology, USA and 2U.S. Army Research Laboratory, USA |
A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports [Pdf]
Hamsha and Nagaraj, RVCE Bangalore, India |
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools [Pdf]
Waqas Aman, Gjovik University College, Norway |
Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review [Pdf]
Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere UniversityKampala, Uganda |
End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc Networks[Pdf]
Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA |
Analysis of RSA Algorithm using GPU Programming [Pdf]
Sonam Mahajan and Maninder Singh, Thapar University, India |
Evaluation of Enhanced Security Solutions in 802.11-Based Networks [Pdf]
Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria |
Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features[Pdf]
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering Pune, India |
State of Mobile Banking in Tanzania and Security Issues [Pdf]
Bossi Masamila, Dublin Institute of Technology, Ireland |
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images [Pdf]
El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University of Khartoum, Sudan |
Privacy Protection for Role-Based Access Control in Service Oriented Architecture [Pdf]
Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada |
Survey of Manet Misbehaviour Detection Approaches [ Pdf ]
Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India |
Attack Graph-Based Risk Assessment and Optimisation Approach [ Pdf ]
Mohammed Alhomidi and Martin Reed, University of Essex, UK |
Security Issues Associated with Big Data in Cloud Computing [ Pdf ]
Venkata Narasimha Inukollu1 , Sailaja Arsi1 and Srinivasa Rao Ravuri2, 1Texas Tech University, USA and 2Cognizant Technology Solutions, India |
A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations [ Pdf ]
FuiFui Wong and Cheng Xiang Tan, TongJi University, China |
Role of Integrated Virtual E-Learning System for Distance Learning Students [ Pdf ]
Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology for Women, India |
Self-Protection Mechanism For Wireless Sensor Networks [ Pdf ]
Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran |
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes [ Pdf ]
Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India |
The Impact of Management Information systems(MIS) Technologies on the quality of Services provided at the university of TABUK [Pdf]
Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan |
Enhancing the Impregnability of Linux Servers [ Pdf ]
Rama Koteswara Rao G1, Satya Prasad R2, Pathanjali Sastri A2 and P.E.S.N. Prasad1, 1Prasad V. Potluri Siddhartha Institute of Technology, India and 2Acharya Nagarjuna University, India |
Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To Exploit Diversity [ Pdf ]
Swati Chowdhuri1, Santanu Maiti1, Sheli Sinha Chaudhuriand2 and P.K.Baneerjee2, 1Seacom Engineering College, India and 2Jadavpur University, India |
A New Hybrid Algorithm for Business Intelligence Recommender System [ Pdf ]
P.Prabhu and N.Anbazhagan, Alagappa University, India |
Optimised Malware Detection in Digital Forensics [ Pdf ]
SaeedAlmarri1 and Paul Sant2, 1University of Bedfordshire, United Kingdom and 2University Campus Milton Keynes, United Kingdom |
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach [ Pdf ]
Shadi R. Masadeh1, Ahmad Azzazi2, Bassam A. Y. Alqaralleh3 and Ali, Mousa.Al Sbou3, 1Isra University, Jordan, 2Applied Science University, Jordan and 3Al-Hussein Bin Talal University, Jordan |
Cloud Computing and Security Issues in the Cloud [ Pdf ]
Monjur Ahmed1 and Mohammad Ashraf Hossain2, 1Daffodil Institute of IT, Bangladesh and 2Freelance IT Consultant, Bangladesh. |
A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service Oriented Architecture [ Pdf ]
Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University, Mashhad, Iran |
SPARQL: Semantic Information Retrieval by Embedding Prepositions [ Pdf ]
Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University, India |
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for Electronic Commerce Transactions & Payments [Pdf]
Fahad A Alqahtani, De Montfort University, United Kingdom |
An IAC Approach for Detecting Profile Cloning in Online Social Networks [ Pdf ]
MortezaYousefi Kharaji1 and FatemehSalehi Rizi2, 1Mazandaran University of Science and Technology, Iran and 2Sheikhbahaee University of Isfahan, Iran |
Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares [ Pdf ]
Pallavi Vijay Chavan1, Mohammad Atique2 and Latesh Malik1, 1GHRCE - Nagpur, India and 2SGBAU -Amravati, India |
|
|