Volume 4, Number 1, January 2012 |
Citation Count |
|
Optimizing One Fair Document Exchange Protocol
|
03 |
|
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
|
10 |
|
Protected Data Objects Replication in Data Grid
|
0 |
|
Efficient & Secure Data Hiding Using Secret Reference Matrix
|
04 |
|
Risks and Remedies in E-Learning System
|
29 |
|
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
|
19 |
|
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network
|
03 |
|
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
|
18 |
|
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
|
01 |
|
A Security Suite for Wireless Body Area Networks
|
22 |
|
A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing
|
02 |
|
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine
|
0 |
|
Volume 4, Number 2, March 2012 |
Citation Count |
|
A Generic Framework for Device Pairing in Ubiquitous Computing Environments
|
01 |
|
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
|
01 |
|
Cross Layer Intrusion Detection System for Wireless Sensor Network
|
25 |
|
Minimizing the Time of Spam Mail ‎Detection by Relocating ‎Filtering System to the Sender ‎Mail Server
|
03 |
|
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids
|
03 |
|
Cloud Computing Security in Business Information Systems
|
28 |
|
Design and Analysis of a Novel Digital Image Encryption Scheme
|
27 |
|
An Implementation of Intrusion Detection System Using Genetic Algorithm
|
185 |
|
Forensic Analysis of Windows Registry Against Intrusion
|
08 |
|
LPM: A Distributed Architecture and Alogorithms for Location Privacy in LBS
|
03 |
|
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
|
02 |
|
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
|
03 |
|
Identification of Image Spam by Using Low Level & Metadata Features
|
02 |
|
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
|
79 |
|
Passblot: A Highly Scalable Graphical one Time Password System
|
05 |
|
Volume 4, Number 3, May 2012 |
Citation Count |
|
Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems
|
05 |
|
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
|
13 |
|
Security Threats Analysis in Bluetooth-Enabled Mobile Devices
|
03 |
|
Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under Water Acoustic Sensor Networks
|
03 |
|
The New Age of Computer Virus and Their Detection
|
05 |
|
Provable Secure Identity Based Signcryption Schemes without Random Oracles
|
09 |
|
Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation
|
05 |
|
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
|
09 |
|
Volume 4, Number 4, July 2012 |
Citation Count |
|
Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining Replication and Diversity
|
02 |
|
Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP
|
0 |
|
Evaluation of Security Attacks on UMTS Authentication Mechanism
|
19 |
|
Non-Profit Organizations' Need to Address Security for Effective Government Contracting
|
07 |
|
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
|
02 |
|
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
|
02 |
|
How to Avoid the N-1 Attack Without Costly Implementations
|
0 |
|
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security
|
06 |
|
Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System
|
0 |
|
A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping Binary Exponential Backoff IEEE 802.15.4
|
01 |
|
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks
|
10 |
|
Personal Safety Triggering System on Android Mobile Platform
|
12 |
|
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
|
15 |
|
Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs with the Theory of Games
|
0 |
|
Volume 4, Number 5, September 2012 |
Citation Count |
|
Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
|
0 |
|
Comparison of High Speed Congestion Control Protocols
|
04 |
|
Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts
|
01 |
|
A Framework For Performance Evaluation Of ASIPs in Network-Based IDS
|
01 |
|
Design And Validation Of Specification Based Ids For Power Enhancement Related Vulnerabilities In AODV
|
0 |
|
Security V/S Qos for LTE Authentication and Key Agreement Protocol
|
09 |
|
Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and Acquisition of Companies
|
01 |
|
Healthcare IT: Is Your Information At Risk?
|
05 |
|
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
|
05 |
|
A Survey on Web Spam Detection Methods: Taxonomy
|
09 |
|
Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network
|
18 |
|
A Simple and Reliable Touch Sensitive Security System
|
11 |
|
Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer Network
|
0 |
|
Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM System with Implementation of Concatenated ECB and CFB Cryptographic Algorithm
|
0 |
|
Explore Ten Different Types of Software Engineering Principles
|
03 |
|
Volume 4, Number 6, November 2012 |
Citation Count |
|
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
|
07 |
|
Secured RFID Mutual Authentication Scheme for Mifare Systems
|
02 |
|
Malware Detection, Supportive Software Agents and Its Classification Schemes
|
11 |
|
Mining Techniques in Network Security to Enhance Intrusion Detection Systems
|
06 |
|
A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel
|
02 |
|
Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker
|
04 |
|
The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS
|
0 |
|
Wireless Public Key Infrastructure for Mobile Phones
|
04 |
|
Secure Key Management Protocol in WIMAX
|
04 |
|
A Novel Multipoint Relay based Secure Routing in MANET
|
01 |
|
Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique
|
02 |
|
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography
|
01 |
|
Review on IPv6 Security Vulnerability Issues and Mitigation Methods
|
07 |