Volume 3, Number 1, January 2011 |
Citation Count |
|
Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options
|
20 |
|
Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic Algorithm For VOIP
|
01 |
|
An Overview Of The Security Concerns In Enterprise Cloud Computing
|
182 |
|
A Human-Centric Approach To Group-Based Context-Awareness
|
08 |
|
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector
|
14 |
|
Failure of A Mix Network
|
03 |
|
Analysis of Web Logs And Web User In Web Mining
|
96 |
|
Volume 3, Number 2, March 2011 |
Citation Count |
|
A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks
|
11 |
|
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
|
18 |
|
Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable Length Key
|
03 |
|
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations
|
07 |
|
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System
|
02 |
|
Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel
|
06 |
|
Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience
|
09 |
|
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption
|
07 |
|
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password
|
02 |
|
Replication Attack Mitigations for Static And Mobile WSN
|
19 |
|
Stage Staffing Scheme for Copyright Protection In Multimedia
|
0 |
|
Substitution-diffusion based Image Cipher
|
14 |
|
A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers
|
13 |
|
Image Encryption Based On Diffusion And Multiple Chaotic Maps
|
35 |
|
A QoS Based MAC Protocol For Wireless Ad-hoc Network
|
0 |
|
Volume 3, Number 3, May 2011 |
Citation Count |
|
System Dynamics Based Insider Threats Modeling
|
08 |
|
Countermeasure Tool - Carapace for Network Security
|
01 |
|
On Design of PUF-Based Random Number Generators
|
03 |
|
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment
|
05 |
|
Data Security Using Private Key Encryption System Based on Arithmetic Coding
|
29 |
|
PKI in Government Identity Management Systems
|
10 |
|
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN
|
- |
|
Authentication Schemes for Session Passwords Using Color and Images
|
51 |
|
Transformation from Identity Stone Age to Digital Identity
|
02 |
|
Enterprise Delegation for Service Based Systems
|
0 |
|
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification
|
04 |
|
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
|
41 |
|
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET
|
04 |
|
Volume 3, Number 4, July 2011 |
Citation Count |
|
Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network
|
32 |
|
Wavelet Thresholding Approach For Image Denoising
|
44 |
|
Architecture Of A Identity Based Firewall System
|
07 |
|
Cryptovirology: Virus Approach
|
03 |
|
Security Apprehensions In Different Regions Of Cloud Captious Grounds
|
15 |
|
A Novel Header Matching Algorithm For Intrusion Detection Systems
|
01 |
|
A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing
|
- |
|
E-Voting Protocol Based On Public-Key Cryptography
|
12 |
|
Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using Various Optimization Techniques as Well as Network Management Models Giving Special Emphasis To Attack Tree Model
|
01 |
|
Governing Information Security In Conjunction With Cobit And Iso 27001
|
17 |
|
An Evaluation Of Fingerprint Security Using Noninvertible Biohash
|
15 |
|
RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
|
02 |
|
An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of Encryption On Mac Layer
|
02 |
|
An Ancient Indian Board Game as a Tool for Authentication
|
03 |
|
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption
|
09 |
|
Volume 3, Number 5, September 2011 |
Citation Count |
|
Information Security Synthesis in Online Universities
|
10 |
|
A Multiple Ballots Election Scheme Using Anonymous Distribution
|
01 |
|
Enhanced Secure Algorithm for Message Communication
|
02 |
|
Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
|
0 |
|
An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users
|
0 |
|
Simulation of the Combined Method
|
0 |
|
Prevention of Wormhole Attack in Wireless Sensor Network
|
19 |
|
DDNFS: a Distributed Digital Notary File System
|
0 |
|
Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN
|
0 |
|
Handwritten Text Image Authentication Using Back Propagation
|
04 |
|
A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks
|
18 |
|
BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks
|
17 |
|
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
|
04 |
|
Special Issue on "CNSA 2011" |
||
Botnet Command Detection using Virtual Honeynet
|
12 |
|
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
|
06 |
|
Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks usingReed Solomon Code for Key Predistribution
|
01 |
|
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography
|
04 |
|
Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism
|
17 |
|
Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET
|
03 |
|
Error Detection and Correction for Distributed Group Key Agreement Protocol
|
0 |
|
Volume 3, Number 6, November 2011 |
Citation Count |
|
Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security
|
02 |
|
An Overview of Penetration Testing
|
28 |
|
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
|
0 |
|
Enhancing Infrastructure Security in Real Estate
|
09 |
|
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.
|
07 |
|
Role of Multiple Encryption in Secure Electronic Transaction
|
19 |
|
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
|
12 |
|
Statistical Quality Control Approaches to Network Intrusion Detection
|
02 |
|
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks
|
01 |
|
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
|
0 |
|
User Authentication using Native Language Passwords
|
03 |
|
Prediction of Malicious Objects in Computer Network and Defense
|
05 |
|
Blind Signature Scheme Based on Chebyshev Polynomials
|
01 |
|
Efficient Detection of Sybil attack Based on Cryptography in Vanet
|
27 |
|
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
|
20 |
|
Experimenting with the Novel Approaches in Text Steganography
|
12 |
|
Techniques and Tools for Forensic Investigation of E-mail
|
13 |
|
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm
|
05 |
|
An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS
|
07 |
|
Securing Mobile Agents in MANET against Attacks using Trust
|
04 |