Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Network and Information Security

ISSN: 2074--9090
Publisher: MECS Publisher


ADD TO MY LIST
 
Improved Trial Division Technique for Primality Checking in RSA Algorithm

Author(s): Kumarjit Banerjee | Satyendra Nath Mandal | Sanjoy Kumar Das
Volume: 5
Issue: 9
Year: 2013
Video Forensics in Temporal Domain using Machine Learning Techniques

Author(s): Sunil Jaiswal | Sunita Dhavale
Volume: 5
Issue: 9
Year: 2013
Improved Trial Division Technique for Primality Checking in RSA Algorithm

Author(s): Kumarjit Banerjee | Satyendra Nath Mandal | Sanjoy Kumar Das
Volume: 5
Issue: 9
Year: 2012
Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation

Author(s): Awadhesh Kumar | Prabhat Singh | Vinay Kumar | Neeraj Tyagi
Volume: 5
Issue: 9
Year: 2013
Mobile Localization Based on Clustering

Author(s): Malika BELKADI | Rachida AOUDJIT | Mehammed DAOUI | Mustapha LALAM
Volume: 5
Issue: 9
Year: 2013
Analysis of Reconfigurable Processors Using Petri Net

Author(s): Hadis Heidari
Volume: 5
Issue: 9
Year: 2013
A Genetic Algorithm Inspired Load Balancing Protocol for Congestion Control in Wireless Sensor Networks using Trust Based Routing Framework (GACCTR)

Author(s): Arnab Raha | Mrinal Kanti Naskar | Avishek Paul | Arpita Chakraborty | Anupam Karmakar
Volume: 5
Issue: 9
Year: 2013
Method and System for Protection of Automated Control Systems for “Smart Buildings”

Author(s): Dmitry Mikhaylov | Igor Zhukov | Andrey Starikovskiy | Alexander Zuykov | Anastasia Tolstaya | Maxim Fomin
Volume: 5
Issue: 9
Year: 2013
Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP

Author(s): Mehajabeen Fatima | Roopam Gupta | T.K.Bandhopadhyay
Volume: 5
Issue: 8
Year: 2013
GSM Base Stations Location Monitoring using Geographic Information System

Author(s): Kuboye B. M. | Dada O. A. | Akinwonmi F. C.
Volume: 5
Issue: 8
Year: 2013
A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer

Author(s): Maria Sebastian | Arun Raj Kumar P.
Volume: 5
Issue: 8
Year: 2013
Information Leakage Prevention Using Virtual Disk Drive

Author(s): Tarek S. Sobh
Volume: 5
Issue: 8
Year: 2013
MUSIC 2D-DOA Estimation using Split Vertical Linear and Circular Arrays

Author(s): Yasser Albagory | Amira Ashour
Volume: 5
Issue: 8
Year: 2013
Analysis of the SYN Flood DoS Attack

Author(s): Mitko Bogdanoski | Tomislav Shuminoski | Aleksandar Risteski
Volume: 5
Issue: 8
Year: 2013
Geographic Load Balanced Routing in Wireless Sensor Networks

Author(s): Robin Guleria | Ankit Kumar Jain
Volume: 5
Issue: 8
Year: 2013
Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers

Author(s): M. Milton Joe | R.S. Shaji | K. Ashok Kumar
Volume: 5
Issue: 8
Year: 2013
A Procedure of Text Steganography Using Indian Regional Language

Author(s): Indradip Banerjee | Souvik Bhattacharyya | Gautam Sanyal
Volume: 4
Issue: 8
Year: 2012
Mining Data Streams using Option Trees

Author(s): B.Reshma Yusuf | P.Chenna Reddy
Volume: 4
Issue: 8
Year: 2012
A New Approach for Multicast Routing in Wireless Mesh Networks

Author(s): Mustapha GUEZOURI | Ali KADDOURI
Volume: 4
Issue: 8
Year: 2012
Distributed Encrypting File System for Linux in User-space

Author(s): U. S. Rawat | Shishir Kumar
Volume: 4
Issue: 8
Year: 2012
Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks

Author(s): BISWAJIT BHOWMIK | POOJA | PIYALI SARKAR | NUPUR THAKUR
Volume: 4
Issue: 8
Year: 2012
A New Proposal for Route Finding in Mobile AdHoc Networks

Author(s): H.Vignesh Ramamoorthy | D.Suganya Devi
Volume: 5
Issue: 7
Year: 2013
Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey

Author(s): Joyce Jose | M. Princy | Josna Jose
Volume: 5
Issue: 7
Year: 2013
Flat-Top Ring-Shaped Cell Design for High-Altitude Platform Communications

Author(s): Yasser Albagory
Volume: 5
Issue: 7
Year: 2013
Image Encryption based on the RGB PIXEL Transposition and Shuffling

Author(s): Quist Aphetsi Kester
Volume: 5
Issue: 7
Year: 2013
A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks

Author(s): Rafi U Zaman | Khaleel ur Rahman Khan | A.Venugopal Reddy
Volume: 5
Issue: 7
Year: 2013
Wi-Fi Networks Security and Accessing Control

Author(s): Tarek S. Sobh
Volume: 5
Issue: 7
Year: 2013
Image Encryption Using Chaotic Map and Block Chaining

Author(s): Ibrahim S. I. Abuhaiba | Hanan M. Abuthraya | Huda B. Hubboub | Ruba A. Salamah
Volume: 4
Issue: 7
Year: 2012
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment

Author(s): Basappa B. Kodada | Gaurav Prasad | Alwyn R. Pais
Volume: 4
Issue: 7
Year: 2012
UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment

Author(s): Dilbag Singh | Jaswinder Singh | Amit Chhabra
Volume: 4
Issue: 7
Year: 2012
Estimating the Video Registration Using Image Motions

Author(s): N.Kannaiya Raja | K.Arulanandam | R.Radha krishnan | M.Nataraj
Volume: 4
Issue: 7
Year: 2012
Application of Biometrics in Mobile Voting

Author(s): Donovan Gentles | Suresh Sankaranarayanan
Volume: 4
Issue: 7
Year: 2012
Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting

Author(s): Nischay Bahl | Ajay K. Sharma | Harsh K. Verma
Volume: 4
Issue: 7
Year: 2012
An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps

Author(s): Ruisong Ye | Haiying Zhao
Volume: 4
Issue: 7
Year: 2012
A Robust Image Steganography using DWT Difference Modulation (DWTDM)

Author(s): Souvik Bhattacharyya | Gautam Sanyal
Volume: 4
Issue: 7
Year: 2012
Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers

Author(s): P. Mabin Joseph | J. Rajan | K.K. Kuriakose | S.A.V. Satya Murty
Volume: 5
Issue: 6
Year: 2013
A Robust Fault Detection Scheme for the Advanced Encryption Standard

Author(s): Hassen Mestiri | Noura Benhadjyoussef | Mohsen Machhout | Rached Tourki
Volume: 5
Issue: 6
Year: 2013
Password Hardened Biometric: A Complete Solution of Online Security

Author(s): Ajay Sharma | Deo Brat Ojha
Volume: 5
Issue: 6
Year: 2013
A Fair Downlink Scheduling Algorithm for 3GPP LTE Networks

Author(s): S. M. Chadchan | C. B. Akki
Volume: 5
Issue: 6
Year: 2013
Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network

Author(s): Smita Parija | Santosh Kumar Nanda | Prasanna Kumar Sahu | Sudhansu Sekhar Singh
Volume: 5
Issue: 6
Year: 2013
Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure

Author(s): Ritu Garg | Awadhesh Kumar Singh
Volume: 5
Issue: 6
Year: 2013
Social Networking for Botnet Command and Control

Author(s): Ashutosh Singh | Annie H. Toderici | Kevin Ross | Mark Stamp
Volume: 5
Issue: 6
Year: 2013
Deliberate Secure Grid Computing Blueprint Design in Indian Context

Author(s): Sanjeev Puri | Harsh Dev
Volume: 4
Issue: 6
Year: 2012
Security Aspects and Challenges in Mobile Adhoc Networks

Author(s): G. Jose Moses | P.Suresh Varma | N.Supriya | G.NagaSatish
Volume: 4
Issue: 6
Year: 2012
Toward Security Test Automation for Event Driven GUI Web Contents

Author(s): Izzat Alsmadi | Ahmed AlEroud
Volume: 4
Issue: 6
Year: 2012
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks

Author(s): Manjusha Pandey | Shekhar Verma
Volume: 4
Issue: 6
Year: 2012
QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments

Author(s): N.Kannaiya Raja | R. Saritha | A.Senthamaraiselvan | K. Arulanandam
Volume: 4
Issue: 6
Year: 2012
Preventive Aspect of Black Hole Attack in Mobile AD HOC Network

Author(s): Kumar Roshan | Vimal Bibhu
Volume: 4
Issue: 6
Year: 2012
Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing

Author(s): P. Lokesh Kumar Reddy | B. Rama Bhupal Reddy | S. Rama Krishna
Volume: 4
Issue: 6
Year: 2012
A Bespoke Technique for Secret Messaging

Author(s): Mahimn Pandya | Hiren Joshi | Ashish Jani
Volume: 5
Issue: 5
Year: 2013
Biometric Passport Validation Scheme using Radio Frequency Identification

Author(s): V.K. Narendira Kumar | B. Srinivasan
Volume: 5
Issue: 5
Year: 2013
Criteria Specifications for the Comparison and Evaluation of Access Control Models

Author(s): Shabnam Mohammad Hasani | Nasser Modiri
Volume: 5
Issue: 5
Year: 2013
The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity

Author(s): Shafi’í Muhammad Abdulhamid | Olawale Surajudeen Adebayo | Damian Oshomah Ugiomoh | Mohammed Danlami AbdulMalik
Volume: 5
Issue: 5
Year: 2013
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals

Author(s): Zhukov Igor | Mikhaylov Dmitry | Starikovskiy Andrey | Kuznetsov Dmitry | Tolstaya Anastasia | Zuykov Alexander
Volume: 5
Issue: 5
Year: 2013
Effect of Black Hole Attack on MANET Routing Protocols

Author(s): Jaspal Kumar | M. Kulkarni | Daya Gupta
Volume: 5
Issue: 5
Year: 2013
Recent Replica Placement Algorithms in P2P Networks – A Review

Author(s): Kala Karun. A | Jayasudha. J. S
Volume: 5
Issue: 5
Year: 2013
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System

Author(s): G.Velmayil | S.Pannirselvam
Volume: 5
Issue: 5
Year: 2013
An Analytical Assessment on Document Clustering

Author(s): Pushplata | Ram Chatterjee
Volume: 4
Issue: 5
Year: 2012
A Modified Hill Cipher using Randomized Approach

Author(s): A.V.N.Krishna | K.Madhuravani
Volume: 4
Issue: 5
Year: 2012
Congestion Control in 4G Wireless Networks Using Coalition Game

Author(s): S. V. Saboji | C. B. Akki
Volume: 4
Issue: 5
Year: 2012
Evaluating Overheads of Integrated Multilevel Checkpointing Algorithms in Cloud Computing Environment

Author(s): Dilbag Singh | Jaswinder Singh | Amit Chhabra
Volume: 4
Issue: 5
Year: 2012
IEATH: Improved Energy Aware and Two Hop Multipath Routing Protocol in Wireless Sensor Networks

Author(s): S. Saqaeeyan | M. Roshanzadeh
Volume: 4
Issue: 5
Year: 2012
Split-Network in Wireless Sensor Network:Attack and Countermeasures

Author(s): Chunlai Du | Jianshun Zhang | Li Ma
Volume: 3
Issue: 5
Year: 2011
An Underwater Acoustic Routing protocol based on Hole Projecton

Author(s): Hu. HongNing | Liu. Zhong | Li. Lu
Volume: 3
Issue: 5
Year: 2011
On the Performance of Priority-Based Virtual Channels Scheduling Algorithm in Packet Telemetry System

Author(s): TIAN Ye | ZHANG Yan-qin | ZHANG Zi-jing
Volume: 3
Issue: 5
Year: 2011
Bilayer Beams and Relay Sharing based OFDMA Cellular Architecture

Author(s): Yanxiong Pan | Hui Han | Sihai Zhang | Wuyang Zhou
Volume: 3
Issue: 5
Year: 2011
Locating all the Frequency Hopping Components Using Multi-species Particle Swarm Optimization

Author(s): Guo Jiantao | Wang Lin
Volume: 3
Issue: 5
Year: 2011
Improved FCLSD algorithm based on LTE/LTE-A system

Author(s): Kewen Liu | Quan Liu | He Ting
Volume: 3
Issue: 5
Year: 2011
Measuring Corporate Social Responsibility Based on a Fuzzy Analytical Hierarchy Process

Author(s): Shouming Chen | Jiasi Fan
Volume: 3
Issue: 5
Year: 2011
A Study of Half-Duplex Asymmetric Two-Way Decode-and-Forward Relaying Using Relay Selection

Author(s): Xiaodong Ji | Baoyu Zheng | Li Zou
Volume: 3
Issue: 5
Year: 2011
A Novel Routing Scheme for Mobile Ad Hoc Network

Author(s): Prem Chand | M.K.Soni
Volume: 5
Issue: 4
Year: 2013
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

Author(s): Alawi A. Al-Saggaf | Haridas Acharya
Volume: 5
Issue: 4
Year: 2013
Formal Verification of Congestion Control Algorithm in VANETs

Author(s): Mohamad Yusof Darus | Kamalrulnizam Abu Bakar
Volume: 5
Issue: 4
Year: 2013
Omni Directional Antenna Assisted Scheme to Minimize Redundancy in Wireless Sensor Networks

Author(s): Tarun Dubey | O.P. Sahu
Volume: 5
Issue: 4
Year: 2013
A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks

Author(s): CH. V. Raghavendran | G. Naga Satish | P. Suresh Varma
Volume: 5
Issue: 4
Year: 2013
3-Level Heterogeneity Model for Wireless Sensor Networks

Author(s): Satish Chand | Samayveer Singh | Bijendra Kumar
Volume: 5
Issue: 4
Year: 2013
QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks

Author(s): Sanjay Kumar | Mayank Dave | Surender Dahiya
Volume: 5
Issue: 4
Year: 2013
Evaluation of IP Multimedia Subsystem based Mobile Mass Examination System

Author(s): Ahmed Barnawi | Abdulrahman H. Altalhi | M. Rizwan Jameel Qureshi | Asif Irshad Khan
Volume: 4
Issue: 4
Year: 2012
Recent Advances of Distributed Optical Fiber Raman Amplifiers in Ultra Wide Wavelength Division Multiplexing Telecommunication Networks

Author(s): Abd El–Naser A. Mohamed | Ahmed Nabih Zaki Rashed | Mahmoud M. A. Eid
Volume: 4
Issue: 4
Year: 2012
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP

Author(s): Oyeyinka I.K. | Akinwale A.T. | Folorunso O. | Olowofela J.A. | Oluwatope A.
Volume: 4
Issue: 4
Year: 2012
Mobile Governance based on WiMAX Connectivity for Rural Development in India

Author(s): Kalpana Chaudhari | Upena D Dalal | Rakesh Jha
Volume: 4
Issue: 4
Year: 2012
Digital Forensic Investigation Tools and Procedures

Author(s): K. K. Sindhu | B. B. Meshram
Volume: 4
Issue: 4
Year: 2012
An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks

Author(s): S. Santhosh Baboo | K. Gokulraj
Volume: 4
Issue: 4
Year: 2012
Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

Author(s): Manjusha Pandey | Shekhar Verma
Volume: 4
Issue: 4
Year: 2012
A Packet Routing Model for Computer Networks

Author(s): O. Osunade
Volume: 4
Issue: 4
Year: 2012
Identity Authentication and Context Privacy Preservation in Wireless Health Monitoring System

Author(s): Qiming Huang | Xing Yang | Shuang Li
Volume: 3
Issue: 4
Year: 2011
Research of Emergency Vehicles Information System Based on SOA

Author(s): Guangliang Li | Minghai Yao
Volume: 3
Issue: 4
Year: 2011
Genetic spectrum assignment model with constraints in cognitive radio networks

Author(s): Fang Ye | Rui Yang | Yibing Li
Volume: 3
Issue: 4
Year: 2011
Layered Design and Collaborative Development of Network System and Its Application in Real-time Information Cluster

Author(s): Qiudong Sun | Wenxin Ma | Yongping Qiu | Wei Chen
Volume: 3
Issue: 4
Year: 2011
Effect of Short-Term Synaptic Plasticity on Correlated firing in Feedback Networks

Author(s): Jinli Xie | Zhijie Wang | Haibo Shi
Volume: 3
Issue: 4
Year: 2011
Particle Swarm Optimization for Multi-constrained Routing in Telecommunication Networks

Author(s): Hongyan Cui | Jian Li | Xiang Liu | Yunlong Cai
Volume: 3
Issue: 4
Year: 2011
Modeling and Accomplishment of Loading-and-Unloading Equipment Optimum Allocation System at Bulk Terminal

Author(s): Xueping Wang | Lei Wu | Mingwang Dong
Volume: 3
Issue: 4
Year: 2011
User’s Profile Replication Tree and On Demand Replica Update in Wireless Communication

Author(s): Prem Nath | Chiranjeev Kumar
Volume: 5
Issue: 3
Year: 2013
Vulnerabilities in Academic E-governance Portals

Author(s): Subhash Chander | Ashwani Kush
Volume: 5
Issue: 3
Year: 2013
Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach

Author(s): G.RoslineNesakumari | V.Vijayakumar | B.V.Ramana Reddy
Volume: 5
Issue: 3
Year: 2013
Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Author(s): Dilpreet Kaur | Naresh Kumar
Volume: 5
Issue: 3
Year: 2013
A Framework for Real-Time Resource Allocation in IP Multimedia Subsystem Network

Author(s): Muhammad Naeem | Sheneela Naz | Saira Gillani
Volume: 5
Issue: 3
Year: 2013
A Comparative Study of Power Consumption Models for CPA Attack

Author(s): Hassen Mestiri | Noura Benhadjyoussef | Mohsen Machhout | Rached Tourki
Volume: 5
Issue: 3
Year: 2013
Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

Author(s): Ibrahim S. I. Abuhaiba | Huda B. Hubboub
Volume: 5
Issue: 3
Year: 2013
A Full-text Website Search Engine Powered by Lucene and The Depth First Search Algorithm

Author(s): Modinat. A. Mabayoje | O. S. Oni | Olawale S. Adebayo
Volume: 5
Issue: 3
Year: 2013
Investigations of Cellular Automata Linear Rules for Edge Detection

Author(s): Fasel Qadir | Khan K. A.
Volume: 4
Issue: 3
Year: 2012
Free Space Optical Channel Characterization and Modeling with Focus on Algeria Weather Conditions

Author(s): Mehdi ROUISSAT | A. Riad BORSALI | Mohammad E. CHIKH-BLED
Volume: 4
Issue: 3
Year: 2012
Fast Vertical Handover Algorithm for Vehicular Communication: A Holistic Approach

Author(s): Sourav Dhar | Shubhajit Datta | Rabindra Nath Bera | Amitava Ray
Volume: 4
Issue: 3
Year: 2012
Distributed Algorithms for Improving Search Efficiency in P2P Overlays

Author(s): Chittaranjan Hota | Vikram Nunia | Antti Ylä-Jääski
Volume: 4
Issue: 3
Year: 2012
An Algebraic Method for the N-Queens Problem Based on Permutation Operation Group

Author(s): Jun Zhang | Zili Zhang
Volume: 3
Issue: 3
Year: 2011
A Dynamic Topology Management in a Hybrid Wireless Superstore Network

Author(s): Shankaraiah | Pallapa Venkataram
Volume: 3
Issue: 3
Year: 2011
A Novel Framework to Carry Out Cloud Penetration Test

Author(s): Jianbin Hu | Yonggang Wang | Cong Tang | Zhi Guan | Fengxian Ren | Zhong Chen
Volume: 3
Issue: 3
Year: 2011
A Frequency Estimation for TD-SCDMA UE Based on Phase Difference

Author(s): Ren-Ming Peng | Zheng-Tong. Hao | Yang. Mei
Volume: 3
Issue: 3
Year: 2011
A public opinion classification algorithm based on micro-blog text sentiment intensity: Design and implementation

Author(s): Xin Mingjun | Wu Hanxiang | Li Weimin | Niu Zhihua
Volume: 3
Issue: 3
Year: 2011
Study on Supervision Mechanism in Mobile Value-added Market Based on Stackelberg Game Theory

Author(s): Di ZHAO | Chuanliang JIA
Volume: 3
Issue: 3
Year: 2011
Searching Methods of MP2P Based on Diffusion Strategy of Resources Index

Author(s): Fangfang Guo | Jing Xu
Volume: 3
Issue: 3
Year: 2011
Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management

Author(s): Abd El–Naser A. Mohammed | Ahmed Nabih Zaki Rashed | Osama S. Fragallah | Mohamed G. El-Abyad
Volume: 5
Issue: 2
Year: 2013
Study the One-bit Hard Combination Scheme on Cognitive Radio Users

Author(s): Md. Shamim Hossain | Mohammad Mamunur Rashid | Md. Nazrul Islam | Md. Abdullah-Al-Mashud | Md. Nurul Islam
Volume: 5
Issue: 2
Year: 2013
A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature

Author(s): V.K. Narendira Kumar | B. Srinivasan
Volume: 5
Issue: 2
Year: 2013
Digital Image Scrambling Based on Two Dimensional Cellular Automata

Author(s): Fasel Qadir | M. A. Peer | K. A. Khan
Volume: 5
Issue: 2
Year: 2013
Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP

Author(s): Sounak Paul | Bimal Kumar Mishra
Volume: 5
Issue: 2
Year: 2013
Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems

Author(s): Vadym Mukhin | Artem Volokyta
Volume: 5
Issue: 2
Year: 2013
FPGA Based A New Low Power and Self-Timed AES 128-bit Encryption Algorithm for Encryption Audio Signal

Author(s): Bahram Rashidi | Bahman Rashidi
Volume: 5
Issue: 2
Year: 2013
Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries

Author(s): Jaskanwal Minhas | Raman Kumar
Volume: 5
Issue: 2
Year: 2013
Hardware Implementation of Elliptic Curve Cryptography over Binary Field

Author(s): Sandeep S.V | Hameem Shanavas.I | Nallusamy.V | Brindha.M
Volume: 4
Issue: 2
Year: 2012
Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System

Author(s): V.K. Narendira Kumar | B. Srinivasan
Volume: 4
Issue: 2
Year: 2012
Semifragile Watermarking Schemes for Image Authentication- A Survey

Author(s): Archana Tiwari | Manisha Sharma
Volume: 4
Issue: 2
Year: 2012
A Novel Security Scheme for Secret Data using Cryptography and Steganography

Author(s): Phad Vitthal S. | Bhosale Rajkumar S. | Panhalkar Archana R.
Volume: 4
Issue: 2
Year: 2012
Error Detection & Correction in Wireless Sensor Networks By Using Residue Number Systems

Author(s): M. Roshanzadeh | S. Saqaeeyan
Volume: 4
Issue: 2
Year: 2012
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

Author(s): M. Anand Kumar | S.Karthikeyan
Volume: 4
Issue: 2
Year: 2012
Improved Classification Methods for Brain Computer Interface System

Author(s): YI Fang | LI Hao | JIN Xiaojie
Volume: 4
Issue: 2
Year: 2012
Improved Multi-Path and Multi-Speed Routing Protocol in Wireless Sensor Networks

Author(s): S. Saqaeeyan | M. Roshanzadeh
Volume: 4
Issue: 2
Year: 2012
A New Secure Strategy in Small-Scale IEEE 802.11 Wireless Local Area Networks with Web Authentication and Virtual Local Area Network

Author(s): Huiting Liu | Hua Zhang | Weilin Xu | Yigang Yang | Mengyuan Xu
Volume: 3
Issue: 2
Year: 2011
Semi-Distributed Coordinative Switch Beamforming with Power Scheduling

Author(s): Ying Liu | Fangjiong Chen | Fei Ji | Xiaodong Chen | Shangkun Xiong
Volume: 3
Issue: 2
Year: 2011
Transaction-based QoS management in a Hybrid Wireless Superstore Environment

Author(s): Shankaraiah | Pallapa Venkataram
Volume: 3
Issue: 2
Year: 2011
Study of 2D DOA Estimation for Uniform Circular Array in Wireless Location System

Author(s): Ping TAN | Pian WANG | Ye LUO | Yufeng ZHANG | Hong MA
Volume: 2
Issue: 2
Year: 2010
An Improved Dynamic Probabilistic Packet Marking for IP Traceback

Author(s): Qiao Yan | Xiaoming He | Tuwen Ning
Volume: 2
Issue: 2
Year: 2010
Research on Trusted Industrial Control Ethernet Network

Author(s): ZHOU Sen-xin | HAN Jiang-hong | TANG Hao
Volume: 2
Issue: 2
Year: 2010
A new Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism

Author(s): Jing Xiao-Pei | Wang Hou-Xiang
Volume: 2
Issue: 2
Year: 2010
A Novel VideoTransmission Evaluation Framework based on TCP-Friendly Congestion Control Mechanism

Author(s): Xiao fu | Hu Ting | Yu JianPing | Sun Lijuan | Wang RuChuan
Volume: 2
Issue: 2
Year: 2010
Code Formal Verification of Operation System

Author(s): Yu Zhang | Yunwei Dong | Huo Hong | Fan Zhang
Volume: 2
Issue: 2
Year: 2010
Reduced complexity FSD algorithm based on noise variance

Author(s): Xinyu Mao | Shubo Ren | Haige Xiang
Volume: 2
Issue: 2
Year: 2010
The Research of Unconditionally Secure Authentication Code For Multi-Source Network Coding

Author(s): Hong Yang | Mingxi Yang
Volume: 3
Issue: 2
Year: 2011
Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage

Author(s): Xi Chen | Yong Li
Volume: 3
Issue: 2
Year: 2011
Design and Application of A New Hybrid Heuristic Algorithm for Flow Shop Scheduling

Author(s): Fang Wang | Yun-qing Rao | Yu Hou
Volume: 3
Issue: 2
Year: 2011
A Secure Method for Network Coding-based Reprogramming Protocols in Wireless Sensor Networks

Author(s): Yu Zhang | Xing She Zhou | Yee Wei Law | Marimuthu Palaniswami
Volume: 3
Issue: 2
Year: 2011
Securing the Distributions in P2P Networks with Trusted Platform Modules

Author(s): Hao Li | Yu Qin | Qianying Zhang | Shijun Zhao
Volume: 3
Issue: 2
Year: 2011
Text Steganography Using Quantum Approach in Regional Language with Revised SSCE

Author(s): Indradip Banerjee | Souvik Bhattacharyya | Gautam Sanyal
Volume: 4
Issue: 12
Year: 2012
Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols

Author(s): G.Sunayana | Sukrutharaj.M | Lalitha rani.N | M.B.Kamakshi
Volume: 4
Issue: 12
Year: 2012
Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition

Author(s): Harminder Singh Bindra | A L Sangal
Volume: 4
Issue: 12
Year: 2012
Risk Management Strategies for the Use of Cloud Computing

Author(s): Chiang Ku Fan | Chen-Mei Fan Chiang | Tong Liang Kao
Volume: 4
Issue: 12
Year: 2012
Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations

Author(s): M.Nirmala | Ramachandra.V.Pujeri
Volume: 4
Issue: 12
Year: 2012
Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation

Author(s): Mohamed Ibrahim AK | Lijo George | Kritika Govind | S. Selvakumar
Volume: 4
Issue: 12
Year: 2012
Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

Author(s): Ibrahim S. I. Abuhaiba | Huda B. Hubboub
Volume: 4
Issue: 12
Year: 2012
Software Activation Using Multithreading

Author(s): Jianrui Zhang | Mark Stamp
Volume: 4
Issue: 12
Year: 2012
Study of ANN Configuration on Performance of Smart MIMO Channel Estimation for Downlink LTE-Advanced System

Author(s): Nirmalkumar S. Reshamwala | Pooja S. Suratia | Satish K. Shah
Volume: 5
Issue: 11
Year: 2013
An Update based Energy-Efficient Reactive Routing Protocol for Mobile Ad Hoc Networks

Author(s): Dhirendra Kumar Sharma | Amar Nath Patra | Chiranjeev Kumar
Volume: 5
Issue: 11
Year: 2013
Time Window Management for Alert Correlation using Context Information and Classification

Author(s): Mehdi Bateni | Ahmad Baraani
Volume: 5
Issue: 11
Year: 2013
LPA 2D-DOA Estimation for Fast Nonstationary Sources Using New Array Geometry Configuration

Author(s): AmiraAshour | Yasser Albagory
Volume: 5
Issue: 11
Year: 2013
A New Model for Intrusion Detection based on Reduced Error Pruning Technique

Author(s): Mradul Dhakar | Akhilesh Tiwari
Volume: 5
Issue: 11
Year: 2013
Optimization of Routing in Distributed Sensor Networks Using Heuristic Technique Approach

Author(s): Lokesh. B. Bhajantri | Nalini. N
Volume: 5
Issue: 11
Year: 2013
Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services

Author(s): M A Kabir | K A Sayeed | M A Matin | T Mehenaz | M Kamruzzaman
Volume: 5
Issue: 11
Year: 2013
Extended Queue Management Backward Congestion Control Algorithms for Web Transfers in Wireless Environment

Author(s): V.Sinthu Janita Prakash | D.I.George Amalarethinam | E.George Dharma Prakash Raj
Volume: 4
Issue: 11
Year: 2012
Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems

Author(s): Zahra Atashbar Orang | Ezzat Moradpour | Ahmad Habibizad Navin | Amir Azimi Alasti Ahrabi | Mir Kamal Mirnia
Volume: 4
Issue: 11
Year: 2012
Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework

Author(s): Irshad Ahmad Mir | S.M.K Quadri
Volume: 4
Issue: 11
Year: 2012
Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement

Author(s): Hassan Rasheed
Volume: 4
Issue: 11
Year: 2012
An Effective and Secure Cipher Based on SDDO

Author(s): Bac Do Thi | Minh Nguyen Hieu | Duy Ho Ngoc
Volume: 4
Issue: 11
Year: 2012
Feature Based Audio Steganalysis (FAS)

Author(s): Souvik Bhattacharyya | Gautam Sanyal
Volume: 4
Issue: 11
Year: 2012
A New 512 Bit Cipher for Secure Communication

Author(s): M. Anand Kumar | .S.Karthikeyan
Volume: 4
Issue: 11
Year: 2012
Performance Analysis of Black Hole Attack in Vanet

Author(s): Vimal Bibhu | Kumar Roshan | Kumar Balwant Singh | Dhirendra Kumar Singh
Volume: 4
Issue: 11
Year: 2012
Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques

Author(s): Manish Mahajan | Navdeep Kaur
Volume: 4
Issue: 10
Year: 2012
A Survey: Recent Advances and Future Trends in Honeypot Research

Author(s): Matthew L. Bringer | Christopher A. Chelmecki | Hiroshi Fujinoki
Volume: 4
Issue: 10
Year: 2012
Application of Artificial Neural Network for Clutter Rejection

Author(s): Priyabrata Karmakar | Sourav Dhar | Mithun Chakraborty | Tirthankar Paul
Volume: 4
Issue: 10
Year: 2012
Impact of Model Mobility in Ad Hoc Routing Protocols

Author(s): TAHAR ABBES Mounir | Senouci Mohamed | Kechar Bouabdellah.
Volume: 4
Issue: 10
Year: 2012
Constraint Based Periodicity Mining in Time Series Databases

Author(s): Ramachandra.V.Pujeri | G.M.Karthik
Volume: 4
Issue: 10
Year: 2012
Securing Zone Routing Protocol in Ad-Hoc Networks

Author(s): Ibrahim S. I. Abuhaiba | Hanan M. M. Abu-Thuraia
Volume: 4
Issue: 10
Year: 2012
Self Organized Replica Overlay Scheme for P2P Networks

Author(s): Shashi Bhushan | Mayank Dave | R. B. Patel
Volume: 4
Issue: 10
Year: 2012
Importance of S-Blocks in Modern Block Ciphers

Author(s): Lisitskaya I.V. | Melnychuk E.D | Lisitskiy K.E.
Volume: 4
Issue: 10
Year: 2012
Blactr: A Technique to Revoke the Misbehaving Users with TTP

Author(s): H.Jayasree | A. Damodaram
Volume: 5
Issue: 1
Year: 2013
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

Author(s): Harjot Bawa | Parminder Singh | Rakesh Kumar
Volume: 5
Issue: 1
Year: 2013
Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

Author(s): Poonam Jindal | Brahmjit Singh
Volume: 5
Issue: 1
Year: 2013
Implementation of An Optimized and Pipelined Combinational Logic Rijndael S-Box on FPGA

Author(s): Bahram Rashidi | Bahman Rashidi
Volume: 5
Issue: 1
Year: 2013
Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

Author(s): S.Sheeja | Ramachandra.V.Pujeri
Volume: 5
Issue: 1
Year: 2013
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

Author(s): Balasaheb N. Jagdale | Nileema S. Gawande
Volume: 5
Issue: 1
Year: 2013
Exponential Brute-Force Complexity of A Permutation Based Stream Cipher

Author(s): Mohammed Omari | Hamdy S. Soliman
Volume: 5
Issue: 1
Year: 2013
Getting Obstacle Avoidance Trajectory of Mobile Beacon for Localization

Author(s): Huan-Qing CUI | Ying-Long WANG | Qiang GUO | Nuo WEI
Volume: 2
Issue: 1
Year: 2010
Research on Humanoid Robot Soccer System Based on Fuzzy Logic

Author(s): SHI Lei | WANG Qiang | Wu lijun
Volume: 2
Issue: 1
Year: 2010
A Two-Phase Constructive Heuristic for Minimum Energy Broadcasting in Wireless Ad Hoc Networks

Author(s): Nastaran Rahmani | Kaveh Sheibani
Volume: 2
Issue: 1
Year: 2010
Subcarrier and Power Allocation in OFDM-based Cognitive Radio Systems

Author(s): Pei Zhang | Longxiang Yang | Xu Liu
Volume: 2
Issue: 1
Year: 2010
Research on the method of multi-channel video acquisition and display based on FPGA

Author(s): Jingbo Xia | Xiaohuan Zhao | Weiwu Guo
Volume: 2
Issue: 1
Year: 2010
Intelligent Rate Adaptation Based on Improved Simulated Annealing Algorithm

Author(s): Lianfen. Huang | Chang. Li | Zilong. Gao
Volume: 2
Issue: 1
Year: 2010
Nonlinear Blind Source Separation Using Kernel Multi-set Canonical Correlation Analysis

Author(s): Hua-Gang Yu | Gao-Ming Huang | Jun Gao
Volume: 2
Issue: 1
Year: 2010
Action-Dependent Adaptive Critic Design Based Neurocontroller for Cement Precalciner Kiln

Author(s): Baosheng Yang | Deguang Cao
Volume: 1
Issue: 1
Year: 2009
A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

Author(s): Jing Yang | Wei Zhao | Mai Xu | Baoguo Xu
Volume: 1
Issue: 1
Year: 2009
Semi-Physical Simulation of RR/S Attitude Algorithm Based on Non-Holonomic IMU

Author(s): Zhong. Su | Guodong. Fu | Qing. Li
Volume: 1
Issue: 1
Year: 2009
Using P systems to Solve the Discrete Logarithm Problem used in Diffie-Hellman Key Exchange Protocol

Author(s): Xiaojing Ma | Zhitang Li | Hao Tu
Volume: 1
Issue: 1
Year: 2009
Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints

Author(s): Abdul Sattar Malik | Jingming Kuang | Jiakang Liu | Wang Chong
Volume: 1
Issue: 1
Year: 2009
A Fair-Priority MAC design in Networked Control System

Author(s): Hongjun Li | Xun Li | Hongxu Ma
Volume: 1
Issue: 1
Year: 2009
Tree-Based Matched RFID Yoking Making It More Practical and Efficient

Author(s): Hung-Yu Chien
Volume: 1
Issue: 1
Year: 2009
Cross Layer Transmission for AOS Packet Service

Author(s): Bi Mingxue
Volume: 3
Issue: 1
Year: 2011
A Model of Workflow-oriented Attributed Based Access Control

Author(s): Guoping Zhang | Jing Liu
Volume: 3
Issue: 1
Year: 2011
A WMPLS Based Multicast Mechanism in Mobile Ad hoc Network

Author(s): Li Mengyang | Duan Yunna | Zhang Chunfei
Volume: 3
Issue: 1
Year: 2011
The energy-saving modification program of lighting equipment based on the economic evaluation

Author(s): Yuan Yang | Wei-hua Li | Xin-zheng Zhang | Chu-qi Yang | Dong Lv | Hai-qiang Liao | Lin Yang
Volume: 3
Issue: 1
Year: 2011
A Method of Hash Join in the DAS Model

Author(s): Ma Sha | Yang Bo | Li Kangshun
Volume: 3
Issue: 1
Year: 2011
A Semantic Context-Based Model for MobileWeb Services Access Control

Author(s): Haibo Shen | Yu Cheng
Volume: 3
Issue: 1
Year: 2011
Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm

Author(s): Tao ZHANG | Shuai REN
Volume: 3
Issue: 1
Year: 2011
Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

Author(s): Wazir Zada Khan | Yang Xiang | Mohammed Y Aalsalem | Quratulain Arshad
Volume: 3
Issue: 1
Year: 2011
System Design of a Trusted SoC and Detailed Analysis of its Secure State Transitions

Author(s): Xianwen Yang | Luguo Zhang | Zheng Li | Shixiong Zhu | Wenzheng Zhang | Yongqi Lv
Volume: 2
Issue: 1
Year: 2010
Application of Erlang Formulae in Next Generation Networks

Author(s): Erik Chromy | Tibor Misuth | Adam Weber
Volume: 4
Issue: 1
Year: 2012
Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients

Author(s): Akash Rajak | Kanak Saxena
Volume: 4
Issue: 1
Year: 2012
Enhancing Hash Function Selection Techniques Based on Message Contents

Author(s): Ali Saeed | Muhammad Khalil Shahid
Volume: 4
Issue: 1
Year: 2012
A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice

Author(s): Ruisong Ye | Wei Zhou
Volume: 4
Issue: 1
Year: 2012
CSRF Vulnerabilities and Defensive Techniques

Author(s): Rupali D. Kombade | B.B. Meshram
Volume: 4
Issue: 1
Year: 2012
Optimization Modeling for GM(1,1) Model Based on BP Neural Network

Author(s): Deqiang Zhou
Volume: 4
Issue: 1
Year: 2012
Efficient Hand off using Fuzzy and Simulated Annealing

Author(s): Vikas.M.N | Keshava.K.N | Prabhas.R.K | Hameem Shanavas.I
Volume: 4
Issue: 1
Year: 2012
M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems

Author(s): Arun Raj Kumar P. | S. Selvakumar
Volume: 4
Issue: 1
Year: 2012