Volume 3, Number 1, January 2011

  Citation Count

Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options
Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA

20

Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic Algorithm For VOIP
Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University Teknologi Malaysia, Malaysia

01

An Overview Of The Security Concerns In Enterprise Cloud Computing
Anthony Bisong1 and Syed (Shawon) M. Rahman2, 1Capella University,USA and 2University of Hawaii-Hilo, USA

182

A Human-Centric Approach To Group-Based Context-Awareness
Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, University of Isfahan, Iran

08

Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector
Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK

14

Failure of A Mix Network
Kun Peng, Institute for Infocomm Research, Singapore

03

Analysis of Web Logs And Web User In Web Mining
L.K. Joshila Grace1, V.Maheswari1 and Dhinaharan Nagamalai2, 1Sathyabama University, India and 2Wireilla Net Solutions PTY Ltd, Australia

96

Volume 3, Number 2, March 2011

  Citation Count

A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks
Mohammed Mana1, Mohammed Feham1 and Boucif Amar Bensaber2, 1University of Tlemcen, Algeria and 2Universite du Quebec a Trois-Rivieres, Canada

11

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
Ashok Kumar Das, International Institute of Information Technology - Hyderabad, India

18

Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable Length Key
Sabyasachi Samanta1, Saurabh Dutta2 and Goutam Sanyal3, 1Haldia Institute of Technology, India, 2Dr. B. C. Roy Engineering College - Durgapur, India and 3National Institute of Technology - Durgapur, India

03

The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations
Harry Yosh, HECO Ltd - Canberra, Australia

07

Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System
Renuka Prasad.B1, Annamma Abraham2, Abhas Abhinav3, Sunil.V.Gurlahosur4 and Srinivasa Y4, 1R.V.College of Engineering, India, 2BMSIT - Bengaluru, India, 3DeepRootLinux Pvt Ltd, India, 4SIT - Tumkur, India

02

Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel
Raju Singh and A.K.Vatsa, Shobhit University, India.

06

Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience
C Singh, L Singh and E Marks, University of Guyana

09

Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption
Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of Technology - Durgapur, India

07

A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password
Tanmay Bhattacharya1, Sirshendu Hore2, Ayan Mukherjee3 and S. R. Bhadra Chaudhuri4, 1JIS College Engineering, India, 2Hooghly Engineering & Technology College, India, 3Institute of Science & Technology, India and 4Bengal Engineering & Science University, India

02

Replication Attack Mitigations for Static And Mobile WSN
V.Manjula and C.Chellappan, Anna University - Chennai, India

19

Stage Staffing Scheme for Copyright Protection In Multimedia
Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology - Guwahati, India

0

Substitution-diffusion based Image Cipher
Narendra K Pareek1, Vinod Patidar2 and Krishan K Sud2, 1M L Sukhadia University - Udaipur, India and 2Sir Padampat Singhania University, India

14

A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India

13

Image Encryption Based On Diffusion And Multiple Chaotic Maps
G.A.Sathishkumar1, K.Bhoopathy bagan2 and N.Sriraam3, 1Sri Venkateswara College of Engineering, India, 2Madras Institute of Technology, India and 3SSN College of Engineering, India

35

A QoS Based MAC Protocol For Wireless Ad-hoc Network
Vandana khare1, D.SrinivasRao2 and Y.Madhavee Latha3, 1CMEC - Hyd, India, 2JNTUH - Hyd, India and 3MRECW - Hyd, India

0

Volume 3, Number 3, May 2011

  Citation Count

System Dynamics Based Insider Threats Modeling
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China

08

Countermeasure Tool - Carapace for Network Security
Anand Bisen, Shrinivas Karwa and B.B. Meshram, Veermata Jijabai Technological Institute, India

01

On Design of PUF-Based Random Number Generators
Mehdi Ayat1, Reza Ebrahimi Atani2 and Sattar Mirzakuchaki1, 1Iran University of Science and Technology, Iran and 2The University of Guilan, Iran

03

Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment
Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India

05

Data Security Using Private Key Encryption System Based on Arithmetic Coding
Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India

29

PKI in Government Identity Management Systems
Ali M. Al-Khouri, Emirates Identity Authority, United Arab Emirates

10

Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN
Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi Pradhan, NM Institute of Engineering and Technology, India

-

Authentication Schemes for Session Passwords Using Color and Images
M Sreelatha1, M Shashi2, M Anirudh1, Md Sultan Ahamer1 and V Manoj Kumar1, 1RVR & JC College of Engineering, India and 2Andhra University College of Engineering, India

51

Transformation from Identity Stone Age to Digital Identity
Mohit Kohli, Rolta Technology Limited (RIL), India

02

Enterprise Delegation for Service Based Systems
Coimbatore Chandersekaran1 and William R. Simpson2, 1The Secretary of the Air Force, USA and 2The Institute for Defense Analyses, USA

0

An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification
Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of Technology - Guwahati, India

04

DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India

41

TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET
Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt

04

Volume 3, Number 4, July 2011

  Citation Count

Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network
Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen, Algeria

32

Wavelet Thresholding Approach For Image Denoising
Pankaj Hedaoo and Swati S Godbole, G. H. Raisoni College of Engineering, Nagpur, India.

44

Architecture Of A Identity Based Firewall System
Nenad Stojanovski1 and Marjan Gusev2, 1Makedonski Telekom AD, Orce Nikolov BB, 1000 Skopje, Macedonia and 2Ss. Cyril and Methodius University, Macedonia

07

Cryptovirology: Virus Approach
Shivale Saurabh Anandrao, Vishwakarma Institute Of Information Technology - Pune, India

03

Security Apprehensions In Different Regions Of Cloud Captious Grounds
Gurdev Singh1 Amit Sharma1 and Manpreet Singh Lehal2, 1Eternal University, HP India and 2Lyallpur Khalsa College, India

15

A Novel Header Matching Algorithm For Intrusion Detection Systems
Mohammad A. Alia1, Adnan A. Hnaif1, Hayam K. Al-Anie1, Khulood Abu Maria1, Ahmed M. Manasrah2 and M. Imran Sarwar3, 1Al Zaytoonah University, Jordan, 2Al Yarmouk University, Jordon and 3Universiti Sains Malaysia, Malaysia

01

A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing
S.S. Prasad, Rithika Baruah and Siddharth.A, National Institute of Technology, Jamshedpur, India

-

E-Voting Protocol Based On Public-Key Cryptography
Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif, Al Zaytoonah University, Jordan

12

Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using Various Optimization Techniques as Well as Network Management Models Giving Special Emphasis To Attack Tree Model
Prabhat Kumar Vishwakarma, University of Gondar, Ethiopia

01

Governing Information Security In Conjunction With Cobit And Iso 27001
Tolga Mataracioglu1 and Sevgi Ozkan2, 1TUBITAK National Research Institute of Electronics and Cryptology (UEKAE), Turkey and 2Middle East Technical University, Turkey

17

An Evaluation Of Fingerprint Security Using Noninvertible Biohash
N.Radha1 and S.Karthikeyan2, 1Karpagam University, India and 2College of Applied Sciences, Sultanate of Oman

15

RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
R. Ramesh and S. Gayathri, Anna University, India

02

An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of Encryption On Mac Layer
Gulshan Kumar and Mritunjay Rai, Lovely Professional University, Jalandhar, India.

02

An Ancient Indian Board Game as a Tool for Authentication
Sreelatha Malempati1 and Shashi Mogalla2, 1RVR & JC College of Engineering, Guntur, A.P and 2Andhra University College of Engineering, Visakhapatnam, A.P

03

Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption
Jeyamala Chandrasekaran1 Subramanyan B1 and Raman G.S2, 1Thiagarajar College of Engineering, Madurai and 2KLN College of Information Technology, Madurai

09

Volume 3, Number 5, September 2011

  Citation Count

Information Security Synthesis in Online Universities
Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA

10

A Multiple Ballots Election Scheme Using Anonymous Distribution
Manabu Okamoto, Kanagawa Institute of Technology, Japan

01

Enhanced Secure Algorithm for Message Communication
Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India

02

Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
Vikram Singh and Vatika, Chaudhary Devi Lal University, India

0

An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users
Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand

0

Simulation of the Combined Method
Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia

0

Prevention of Wormhole Attack in Wireless Sensor Network
Dhara Buch1 and Devesh Jinwala2, 1Government Engineering College Rajkot, India and 2S.V. National Institute of Technology, India

19

DDNFS: a Distributed Digital Notary File System
Alexander Zanger, Bond University, Australia

0

Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN
R.Seshadri1 and N..Penchalaiah2, 1S.V.University, India and 2ASCET, India

0

Handwritten Text Image Authentication Using Back Propagation
A S N Chakravarthy1, Penmetsa V Krishna Raja2 and P S Avadhani3, 1Sri Aditya Engineering College, India, 2JNTUK, India and 3Andhra University, India

04

A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks
Hossein Jadidoleslamy, The University of Guilan, Iran

18

BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks
Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria

17

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi, GLS Institute of Computer Technology, India

04

Special Issue on "CNSA 2011"

Botnet Command Detection using Virtual Honeynet
J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India

12

CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
L.Kavisankar and C.Chellappan, Anna University, India

06

Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks usingReed Solomon Code for Key Predistribution
Pinaki Sarkar1 and Aritra Dhar2, 1Jadavpur University, India and 2Gurunanak Institute of Technology, India

01

Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography
G.Geetha1 and C.Jayakumar2, 1Jerusalem college of Engineering, India and 2RMK Engineering college, India

04

Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism
Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela, India

17

Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET
V. Anjana Devi1 and R. S. Bhuvaneswaran2, 1St. Joseph's College of Engineering, India and 2Anna University, India

03

Error Detection and Correction for Distributed Group Key Agreement Protocol
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India

0

Volume 3, Number 6, November 2011

  Citation Count

Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security
William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai, India

02

An Overview of Penetration Testing
Aileen G. Bacudio1, Xiaohong Yuan1, Bei-Tseng Bill Chu2 and Monique Jones1, 1North Carolina A&T State University, USA and 2University of North Carolina at Charlotte, USA

28

The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, India

0

Enhancing Infrastructure Security in Real Estate
Kyle Dees and Syed (Shawon) Rahman, Capella University, USA

09

Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.
Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National Institute of Technology, India

07

Role of Multiple Encryption in Secure Electronic Transaction
Himanshu Gupta1 and Vinod Kumar Sharma2, 1Amity University Campus, India and 2Gurukula Kangri Vishwavidyalaya, India

19

Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
Rohitha Goonatilake1, Rafic Bachnak1 and Susantha Herath2, 1Texas A&M International University, USA and 2St. Cloud State University, USA

12

Statistical Quality Control Approaches to Network Intrusion Detection
Rohitha Goonatilake1, Rafic Bachnak1 and Susantha Herath2, 1Texas A&M International University, USA and 2St. Cloud State University, USA

02

Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks
Pinaki Sarkar1, Amrita Saha2 and Samiran Bag3, 1Jadavpur University, India, 2IIT Bombay, India and 3Indian Statistical Institute, India

01

Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra University, India

0

User Authentication using Native Language Passwords
Sreelatha Malempati1 and Shashi Mogalla2, 1R.V.R. & J.C. College of Engineering, India and 2Andhra University College of Engineering, India

03

Prediction of Malicious Objects in Computer Network and Defense
Hemraj Sainia1, T. C. Panda2 and Minaketan Panda3, 1Alwar Institute of Engineering & Technology, India, 2Orissa Engineering College, India and 3SPANCO TELE, India

05

Blind Signature Scheme Based on Chebyshev Polynomials
Maheswara Rao Valluri, Salalah College of Technology, Oman

01

Efficient Detection of Sybil attack Based on Cryptography in Vanet
Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran

27

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India

20

Experimenting with the Novel Approaches in Text Steganography
Shraddha Dulera1, Devesh Jinwala1 and Aroop Dasgupta2, 1S V National Institute of Technology, India and 2Bhaskaracharya Institute for Space Applications and Geo-Informatics, India

12

Techniques and Tools for Forensic Investigation of E-mail
M. Tariq Banday, University of Kashmir, India

13

Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm
S.G.Srikantaswamy1 and H.D.Phaneendra2, 1National Institute of Engineering - Mysore, India and 2 CSE NIE - Mysore, India

05

An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS
K.Kuppusamy1 and S.Malathi2, 1Alagappa University, India and 2Manonmaniam Sundaranar University, India

07

Securing Mobile Agents in MANET against Attacks using Trust
Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India

04