Volume 4, Number 1, January 2012

  Citation Count

Optimizing One Fair Document Exchange Protocol
Abdullah M. Alaraj, Qassim University, Saudi Arabia

03

IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
K.Munivara Prasad1, A.Rama Mohan Reddy2 and V Jyothsna3, 1Rayalaseema University, India, 2SV University, India and 3Sree vidyanikethan Engg.College, India

10

Protected Data Objects Replication in Data Grid
G. Aruna Kranthi and D. Shashi Rekha, S.R. Engineering College - Warangal, India
Erratum:Due to a serious case of plagiarism this paper has been retracted.

0

Efficient & Secure Data Hiding Using Secret Reference Matrix
Laxman Tawade1, Rajshree Mahajan2 and Chandan Kulthe2, 1Pune University, India and 2Aditya Engineering College, India

04

Risks and Remedies in E-Learning System
Nikhilesh Barik and Sunil Karforma, Burdwan University, India

29

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
Priyank Singhal and Nataasha Raul, Sardar Patel Institute of Technology - University of Mumbai, India

19

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women, India

03

Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Sridhar Subramanian1 and Baskaran Ramachandran2, 1Easwari Engineering College - Chennai, India and 2Anna University - Chennai, India

18

A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India

01

A Security Suite for Wireless Body Area Networks
Raghav V. Sampangi1, Saurabh Dey2, Shalini R. Urs3 and Srinivas Sampalli1, 1Dalhousie University, Canada, 2Analytics Quotient Bangalore, India and 3University of Mysore, India

22

A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing
G.S. Mamatha, R.V. College of Engineering Bangalore, India

02

The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine
Besma Othmani1, Mohsen Machhout1, Houcine Mejri1,2, Hafedh Belmabrouk1 and Rached Tourki1, 1Laboratoire d'Electronique et Micro Electronique Faculte des Sciences de Monastir, Tunisia and 2Ecole Preparatoire aux Academies Melitaires, Tunisia

0

Volume 4, Number 2, March 2012

  Citation Count

A Generic Framework for Device Pairing in Ubiquitous Computing Environments
Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja, University of Sussex, UK

01

LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India

01

Cross Layer Intrusion Detection System for Wireless Sensor Network
Djallel Eddine Boubiche and Azeddine Bilami, LaSTIC Laboratory - UHL Batna, Algeria

25

Minimizing the Time of Spam Mail ‎Detection by Relocating ‎Filtering System to the Sender ‎Mail Server
Alireza Nemaney Pour1, Raheleh Kholghi2 and Soheil Behnam Roudsari2, 1Islamic Azad University of Abhar, Iran and 2Sharif University of Technology, Iran

03

A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids
G.Jacob Victor1, M Sreenivasa Rao2 and V.CH. Venkaiah3, 1SERP - RD Department, India, 2JNTU - Hyderabad, India and 3CRRao AIMS & CS - Hyderabad, India

03

Cloud Computing Security in Business Information Systems
Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Ss. Cyril and Methodius University, Macedonia

28

Design and Analysis of a Novel Digital Image Encryption Scheme
Narendra K Pareek, M L Sukhadia University, India

27

An Implementation of Intrusion Detection System Using Genetic Algorithm
Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, Shahjalal University of Science and Technology, Bangladesh

185

Forensic Analysis of Windows Registry Against Intrusion
Haoyang Xie1, Keyu Jiang1, Xiaohong Yuan2 and Hongbiao Zeng1, 1Fort Hays State University, USA and 2North Carolina A&T State University, USA

08

LPM: A Distributed Architecture and Alogorithms for Location Privacy in LBS
Muhamed Ilyas and R. Vijayakumar, Mahatma Gandhi University Kottayam, India

03

Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar, College of Engineering - Pune, India

02

Lattice Based Tools in Cryptanalysis for Public Key Cryptography
R.Santosh Kumar1, C.Narasimham2 and S.Pallam Setty3, 1MVGR College of Engg., India, 2VR Siddhartha Engineering College, India and 3Andhra University, India

03

Identification of Image Spam by Using Low Level & Metadata Features
Anand Gupta, Chhavi Singhal and Somya Aggarwal, Netaji Subhas Institute of Technology, India

02

Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
>S. Sree Vivek1, S. Sharmila Deva Selvi1, V. Radhakishan2, C. Pandu Rangan1, 1IIT Madras, India and 2NIT Trichy, India

79

Passblot: A Highly Scalable Graphical one Time Password System
Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V Gangashetty, IIIT - Hyderabad, India

05

Volume 4, Number 3, May 2012

  Citation Count

Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems
Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse Toulouse, France

05

Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and Technology Noida, India

13

Security Threats Analysis in Bluetooth-Enabled Mobile Devices
Robayet Nasim, University of Science & Technology Chittagong, Bangladesh

03

Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under Water Acoustic Sensor Networks
Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of Engineering Chennai, India

03

The New Age of Computer Virus and Their Detection
Nitesh Kumar Dixit1, Lokesh mishra2, Mahendra Singh Charan1 and Bhabesh Kumar Dey1, 1BIET Sikar, India and 2NCAC Sikar, India

05

Provable Secure Identity Based Signcryption Schemes without Random Oracles
Prashant Kushwah1 and Sunder Lal2, 1Banasthali University, India and 2Veer Bahadur Singh Purvanchal University, India

09

Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation
P. Devaki and G. Raghavendra Rao, NIE Mysore, India

05

Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
P.Natesan and P.Balasubramanie, Kongu Engineering College, India

09

Volume 4, Number 4, July 2012

  Citation Count

Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining Replication and Diversity
Charles A. Kamhoua1, Patrick Hurley1, Kevin A. Kwiat1 and Joon S. Park2, 1Air Force Research Laboratory - Information Directorate, USA and 2Syracuse University, USA

02

Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP
Abdullah AlOtaibi and Hamza Aldabbas, De Montfort University, United Kingdom

0

Evaluation of Security Attacks on UMTS Authentication Mechanism
Mojtaba Ayoubi Mobarhan, Mostafa Ayoubi Mobarhan and Asadollah Shahbahrami, University of Guilan, Iran

19

Non-Profit Organizations' Need to Address Security for Effective Government Contracting
Lee E. Rice1 and Syed (Shawon) M. Rahman1,2, 1Capella University,USA and 2University of Hawaii-Hilo, USA

07

A Novel Energy Efficient and Administrator Based Secured Routing in MANET
Himadri Nath Saha1, Debika Bhattacharyya1 and P. K.Banerjee2, 1Institute of Engineering and Management West Bengal, India and 2Jadavpur university, India

02

Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
S.Karthika, A.Kiruthiga And S.Bose, Anna University, India

02

How to Avoid the N-1 Attack Without Costly Implementations
David Tinoco Varela, Universidad Nacional Autonoma de Mexico, Mexico

0

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security
Manas Paul1 and Jyotsna Kumar Mandal2, 1JIS College of Engineering, India and 2Kalyani University, India

06

Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System
TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar, King Fahd University of Petroleum & Minerals(KFUPM), Saudi Arabia

0

A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping Binary Exponential Backoff IEEE 802.15.4
Archit Verma Pushpinder Singh Patheja and Akhilesh Waoo, BIST Bhopal, India

01

An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks
A. Forootaninia1 and M. B. Ghaznavi-Ghoushchi2, 1Tehran University, Iran and 2Shahed University, Iran

10

Personal Safety Triggering System on Android Mobile Platform
Ashokkumar Ramalingam, Prabhu Dorairaj and Saranya Ramamoorthy, Blekinge Institute of Technology, Sweden

12

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Middlesex University, UK

15

Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs with the Theory of Games
Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar

0

Volume 4, Number 5, September 2012

  Citation Count

Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
Abudhahir Buhari1, Zuriati Ahmad Zukarnain1, Shamala K. Subramaniam1, Hisham Zainuddin1 and Suhairi Saharudin2, 1University Putra Malaysia, Malaysia and 2Technology Park Malaysia, Malaysia

0

Comparison of High Speed Congestion Control Protocols
Jawhar Ben Abed1, Laarif Sinda2, Mohamed Ali Mani3 and Rachid Mbarek2, 1Polytech Sousse, 2ISITCOM Hammam Sousse and 3ISTLS Sousse, Tunisia

04

Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts
Priyanka Dey and Suparna Biswas, West Bengal University, India

01

A Framework For Performance Evaluation Of ASIPs in Network-Based IDS
Majid Nezakatolhoseini1 and Mohammad Amin Taherkhani2, 1Science and Research Branch Islamic Azad University, Iran and 2Shahid Beheshti University, Iran

01

Design And Validation Of Specification Based Ids For Power Enhancement Related Vulnerabilities In AODV
Chaitali Biswas Dutta and Utpal Biswas, University of Kalyani, India

0

Security V/S Qos for LTE Authentication and Key Agreement Protocol
Jacques Bou Abdo1, Jacques Demerjian2 and Hakima Chaouchi3, 1Nokia Siemens Networks, Lebanon, 2Antonine University, Lebanon and 3Telecom Sud Paris, France

09

Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and Acquisition of Companies
Balachandra Muniyal1, Prema K.V2 and Mamatha Balachandra1, 1Manipal University, India and 2Modi Institute of Technological Sciences, India

01

Healthcare IT: Is Your Information At Risk?
Kimmarie Donahue1 and Syed (Shawon) M. Rahman2, 1San Antonio, USA and 2Capella University, USA

05

A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
H.Jayasree1 and A.Damodaram2, 1ATRI, India and 2JNTUH - Kukatpally, India

05

A Survey on Web Spam Detection Methods: Taxonomy
Shekoofeh Ghiam1 and Alireza Nemaney Pour2, 1Sharif University of Technology, Iran and 2Islamic Azad University of Abhar, Iran

09

Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network
Amol Vasudeva1 and Manu Sood2, 1Jaypee University of Information Technology, India and 2Himachal Pradesh University, India

18

A Simple and Reliable Touch Sensitive Security System
Adamu Murtala Zungeru1, Jonathan Gana Kolo1 and Ijarotimi Olumide2, 1University of Nottingham, Malaysia and 2Rufus Giwa Polytechnic, Nigeria

11

Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer Network
Prashant Kumar Singh1, A. K. Vatsa1, Reetu Sharma2 and Priyanka Tyagi3, 1Shobhit University, India, 2CERT, India and 3DVSIET, India

0

Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM System with Implementation of Concatenated ECB and CFB Cryptographic Algorithm
Laila Naznin,Shahrina Sultana, M. Golam Rashed and Shaikh Enayet Ullah, University of Rajshahi, Bangladesh

0

Explore Ten Different Types of Software Engineering Principles
S.Thulasee Krishna1, S.Sreekanth1, B. Bhaskar1 and N.Pavan Kumar2, 1Kuppam Engineering College, India and 2Sitams, Chittoo(DT), India

03

Volume 4, Number 6, November 2012

  Citation Count

RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Merad Boudia Omar Rafik and Feham Mohamed, University of Tlemcen, Algeria

07

Secured RFID Mutual Authentication Scheme for Mifare Systems
Kuo-Tsang Huang and Jung-Hui Chiu, Chang Gung University, Taiwan

02

Malware Detection, Supportive Software Agents and Its Classification Schemes
Adebayo, Olawale Surajudeen1, M.A. Mabayoje2, Amit Mishra3 and Osho Oluwafemi1, 1Federal University of Technology, Nigeria, 2University of Ilorin, Nigeria and 3IBB University Lapai, Nigeria

11

Mining Techniques in Network Security to Enhance Intrusion Detection Systems
Maher Salem and Ulrich Buehler, University of Applied Sciences, Germany

06

A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel
Abudhahir Buhari1, Zuriati Ahmad Zukarnain1, Shamala K. Subramaniam1 , Hisham Zainuddin1 and Suhairi Saharudin2, 1University Putra Malaysia, Malaysia and 2MIMOS - Technology Park Malaysia, Malaysia

02

Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker
Manu S. Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India

04

The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS
John Tengviel1, K. Diawuo2 and K. A. Dotche2, 1Sunyani Polytechnic, Ghana and 2KNUST Kumasi, Ghana

0

Wireless Public Key Infrastructure for Mobile Phones
Balachandra Muniyal, Krishna Prakash and Shashank Sharma, Manipal University, India

04

Secure Key Management Protocol in WIMAX
Noudjoud Kahya1, Nacira Ghoualmi1 and Pascal Lafourcade2, 1Badji Mokhtar University, Algeria and 2Joseph Fourier University, France

04

A Novel Multipoint Relay based Secure Routing in MANET
Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee, IEM KolaKata, India

01

Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique
Oluwafemi Oriola, Adesesan B. Adeyemo and Oluwaseyitanfunmi Osunade, University of Ibadan, Nigeria

02

Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography
Arpita Sarkar and Sachin Tripathi, Indian School of Mines Dhanbad, India

01

Review on IPv6 Security Vulnerability Issues and Mitigation Methods
Supriyanto1, Raja Kumar Murugesan2 and Sureswaran Ramadass3, 1Universitas Sultan Ageng Tirtayasa, Indonesia, 2Taylor's University, Malaysia and 3National Advanced IPv6 Centre (NAv6) Universiti Sains, Malaysia

07