Volume 1, Number 1, April 2009

  Citation Count

Using Rough Set and Support Vector Machine for Network Intrusion Detection
Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of Technology,Taiwan, R.O.C

98

Tools and Techniques for Network Forensics
Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State University,USA

51

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering & Technology, India

19

A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard Algorithm
Poonam Garg,Institute of Management Technology, India

73

A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks
Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of Engineering and Management, India, West Bengal University of Technology,India, University of Calcutta,India

84

Volume 1, Number 2, July 2009

  Citation Count

Iterative method for improvement of coding and decryption
Natasa Zivic, Institute for Data Communication Systems, University of Siegen,Germany

04

Tools A new key establishment Scheme for wireless sensor networks
Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, Department of Computer Science, The University of Hong Kong, Hong Kong

05

Dynamic IDP signature processing by fast elimination using DFA
Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer Networks & Internet Engineering Division, Centre for Development of Advanced Computing,Bangalore, India

03

Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless packet networks
G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of Technology,Tamilnadu, India

09

Clustered Hierarchy in Sensor Networks: Performance and Security
Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar, School of Engineering, University of Bridgeport USA

01

Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States
Yoshito Kanamori 1 and Seong-Moo Yoo 2, 1 University of Alaska Anchorage, Alaska, USA,2 The University of Alabama in Huntsville, Alabama, USA

06

Intelligent Intrusion Detection System Framework Using Mobile Agents
N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT University, India

19

On Generation of Firewall Log Status Reporter (SRr) Using Perl
Sugam Sharma1, Hari Cohly2, and Tzusheng Pei2, 1 Iowa State University, USA, 2Jackson State University, USA

09

Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and Technology (NIST), USA

27

Volume 1, Number 3, October 2009

  Citation Count

Integrating Identity-Based Cryptography in IMS Service Authentication
Mohamed Abid1, Songbo Song2, Hassnaa Moustafa2 and Hossam Afifi1,1Telecom & Management SudParis ,Evry, France

07

Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT University,INDIA.

09

Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication Scheme
Mohammed Aijaz Ahmed1, D. Rajya Lakshmi2 and Sayed Abdul Sattar3 GITAM University, India

17

Psim: A Tool for Analysis of Device Pairing Methods
Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK

05

Data Security in Mobile Devices by GEO Locking
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India

04

Performance Evaluation of a New Route Optimization Technique for Mobile IP
Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia University, Egypt

01

Security Properties in an Open Peer-to-Peer Network
Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire DInformatique Fondamentale DOrleans, Universite DOrleans, Ensi de Bourges, France

03

A Security Framework for SOA Applications in Mobile Environment
Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos portugueses, Campus do Bacanga, Sao Luis, Brazil

16

Securing AODV for MANETs using Message Digest with Secret Key
Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute of Technology & Science, India

08

Application Specific Usage control Implementation Verification
Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta Indian Institute of Technology-Kharagpur, India

03

Volume 2, Number 1, January 2010

  Citation Count

Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks
James Cannady, Nova Southeastern University, USA

09

A Frame Work for Ontological Privacy Preserved Mining
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch, VIT University, India.

08

Workload Characterization of Spam Email Filtering Systems
Yan Luo, University of Massachusetts Lowell, USA

07

Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA

63

Weakness on Cryptographic Schemes Based on Regular LDPC Codes
Omessaad Hamdi1 , Manel abdelhedi2, Ammar Bouallegue2 and Sami Harari3, 1SYSTEL, SUPCOM, Tunisia,2SYSCOM, ENIT, Tunisia and3SIS, USTV, France.

-

Advanced Security Management in Metro Ethernet Networks
Ammar Rayes, Cisco Systems, USA

0

Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application
1Syed S. Rizvi, 2Aasia Riasat and 3Khaled M. Elleithy,1, 3University of Bridgeport, USA and 2Institute of Business Management, Pakistan.

07

Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon

01

Volume 2, Number 2, April 2010

  Citation Count

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology, Guwahati, India

05

Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
Dewan Md. Farid1, Nouria Harbi1, and Mohammad Zahidur Rahman2,1University Lumiere Lyon 2 - France and 2Jahangirnagar University, Bangladesh

96

Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, EGYPT

24

Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
S.Sangeetha1 & V.Vaidehi2,1Angel College of Engineering, India and 2Madras Institute of Technology, India

07

Events Classification in Log Audit
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait

07

Analysis of the Security of BB84 by Model Checking
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi13,1FSO, University Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco

14

Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor
Mohsen Machhout1, Zied Guitouni1, Kholdoun Torki2, Lazhar Khriji3 and Rached Tourki1, 1Faculty of Sciences of Monastir, Tunisia,2TIMA - CMP Laboratory, France and 3Sultane Qaboos University, Oman

15

Impersonation Attack on EKE Protocol
Shirisha Tallapally , Vaagdevi College of Engineering, India

03

A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy-Constrained Devices
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore

04

Trust Based Content Distribution for Peer-To-Peer Overlay Networks
S.Ayyasamy1 and S.N. Sivanandam2,1Tamilnadu College of Engineering, India and 2PSG College of Technology, India

06

Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET
T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology, Sathyamangalam,India

26

Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France

24

Volume 2, Number 3, July 2010

  Citation Count

A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords
Dhananjay Kulkarni, Boston University, USA.

02

Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next Generation High Rate WPAN
Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of Electronics and Telecommunications of Rennes (IETR),France.

12

Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Chang N. Zhang, Qian Yu and Xiao Wei Liu, University of Regina, Canada

0

Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs
Theodore Zahariadis1, Helen Leligou1, Panagiotis Karkazis5,Panagiotis Trakadas2, Ioannis Papaefstathiou5,Charalambos Vangelatos3 and Lionel Besson4, 1 Technological Educational Institute of Chalkis, Greece,2 Hellenic Authority for Communications Security and Privacy (ADAE), Greece,3 Hellenic Aerospace Industry S.A., Greece,4 Thales Communications, France and 5 Technical University of Crete, Greece.

46

Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics Timers
Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant, University of Mauritius.

05

Improving TLS Security By Quantum Cryptography
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi3,1FSO, University Mohamed Ist, Morocco,2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco.

05

Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network
Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2,1Stamford University ,Bangladesh and 2American International University,Bangladesh.

43

Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network
S. Albert Raebra1 and S. Vijayalakshmi2,1St.Josephs College, Bharathidasan University,India and 2Pondicherry University, India

01

An Efficient IP Traceback Through Packet Marking Algorithm
An Efficient IP Traceback Through Packet Marking Algorithm

08

Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment
K R Chandrasekhara Pillai1 and M P Sebastian2,1N S S College of Engineering,India and 2Indian Institute of Management, India

08

Wireless Security Measurement Using Data Value Index
Reza Amirpoor, 1Ajay Kumar 2 and Satish R. Deavne 3,1Bharati Vidyapeeth University,India,2JSPMs JAYAWANT Institute of Computer Applications,India and 3DR.D. Y. Patil Ramrao Adik Institute of Technology,India.

0

An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error Concealment
Amit Phadikar1 and Santi P. Maity 2, 1MCKV Institute of Engineering,India and 2Bengal Engineering and Science University, India

0

Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services
Urjita Thakar1, Nirmal Dagdee2 and Sudarshan Varma3, 1Shri G.S. Institute of Technology and Science,India,2S.D. Bansal College of Technology,India and 3Ideavate Solutions, USA.

15

Volume 2, Number 4, October 2010

  Citation Count

A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features
Angel R. Otero1, Carlos E. Otero2 and Abrar Qureshi2, 1Nova Southeastern University, USA and 2University of Virginia's College at Wise, USA

20

Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option FIeld: A Characterization
Danilo Valeros Bernardo and Doan B Hoang, The University of Technology- Sydney, Australia

06

Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique
M. Kiran Kumar1, S. Mukthyar Azam1 and Shaik Rasool2, 1R.V.R & J.C College of Engg, India and 2S.C.E.T, India

33

Verification of Quantum Cryptography Protocols by Model Checking
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi1,3, 1FSO, University Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist, Morocco and 3Academy Hassan II of Sciences & Technology, Morocco

02

Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks
Vivaksha Jariwala1 and D. C. Jinwala2, 1C. K. Pithawalla College of Engineering and Technology, India and 2S. V. National Institute of Technology, India

03

Security in Wireless Sensor Networks: Key Management Module in SOOAWSN
Mohammed A. Abuhelaleh and Khaled M. Elleithy, University Of Bridgeport, USA

26

Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless Sensor Network
Vikas Kumar1 and Rajender Kumar2, NIT- kurukshetra, India

-

A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
Jaydip Sen, Tata Consultancy Services Ltd - Kolkata, India

14

Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-Server Environment
Rafael Martinez-Pelaez1,2, Francisco Rico-Novella1, Cristina Satizabal2 and Jacek Pomykala3, 1Technical University of Catalonia, Spain, 2Universidad de la Sierra Sur, Mexico and 3Warsaw University, Poland

05

A (2,N) Visual Cryptographic Technique for Banking Applications
Jayanta Kumar Pal1, J. K. Mandal2 and Kousik Dasgupta1, 1Kalyani Government Engineering College, India and 2University of Kalyani, India

13

Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents
Mueen Uddin1, Kamran Khowaja2 and Azizah Abdul Rehman1, 1UTM, Malaysia and 2Isra University, Pakistan

24

A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis, Kingston University - London, United Kingdom

07

Lightweight C&C based botnet detection using Aho-Corasick NFA
Udhayan J1, Anitha R2 and Hamsapriya T2, 1Karunya University, India and 2PSG College of Technology, India

06

Emergency Response Communications and Associated Security Challenges
Muhammad Ibrahim Channa and Kazi M. Ahmed, Asian Institute of Technology, Thailand

10

A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN
Soumya Maity, P Bera, S K Ghosh and Pallab Dasgupta, Indian Institute of Technology - Kharagpur, India

02

Additional Papers

Effective Voice Calls Admission for Authorized User in Inter VOIP Network
Subashri T and Vaidehi V, Anna University - Chennai, India

0

ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan
Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing (C-DAC), India

04

Improving the Reliability of Detection of LSB Replacement Steganography
Shreelekshmi R1, Wilscy M2 and C E Veni Madhavan3, 1College of Engineering -Trivandrum, India, 2University of Kerala, India and 3Indian Institute of Science, India

0

Zero Data Remnance Proof in Cloud Storage
Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India

03

Bayesian Based Comment Spam Defending Tool
Dhinaharan Nagamalai1, Beatrice Cynthia Dhinakaran2 and Jae Kwang Lee2, 1Wireilla Net Solutions, Australia and 2Hannam University, South Korea

02