You are on page 1of 40

International Journal of Network Security & Its Applications

(IJNSA)
ISSN : 0974 - 9330 (Online); 0975 2307 (Print)

http://airccse.org/journal/ijnsa.html
SCOPE OF THE JOURNAL
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open
access peer-reviewed journal that publishes articles which contribute new results in all areas of the
computer Network Security & its applications. The journal focuses on all technical and practical
aspects of security and its applications for wired and wireless networks. The goal of this journal is
to bring together researchers and practitioners from academia and industry to focus on
understanding Modern security threats and countermeasures, and establishing new collaborations in
these areas.

Topics of Interest

Network and Wireless Network Security


Mobile, Ad Hoc and Sensor Network Security
Peer-to-Peer Network Security
Database and System Security
Intrusion Detection and Prevention
Internet Security & Applications
Security & Network Management
E-mail security, Spam, Phishing, E-mail fraud
Virus, worms, Trojon Protection
Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
Ubiquitous Computing Security
Web 2.0 security
Cryptographic protocols
Performance Evaluations of Protocols & Security Application

http://airccse.org/journal/ijnsa.html
Members of the Editorial Board
Editor In Chief:
Jae-Kwang Lee, Hannam University, South Korea

Associate Editor

Dhinaharan Nagamalai, KTO Karatay University, Turkey

Editorial Board

A.K. Vatsa, Shobhit University, India


Abdul Kadir Ozcan, The American university, Cyprus
Alireza Nemaney Pour, Islamic Azad University of Abhar, Iran
Anas Abou El Kalam, UCA/ENSA of Marrakesh, Morocco
Annamma Abraham, B M S Institute of Technology, India
Asadollah Shahbahrami, University of Guilan, Iran
Ashok Kumar Das, International Institute of Information Technology, India
Belhamri Azeddine, Universite Mentori, Algerie
Boo-Hyung Lee, KongJu National University, South Korea
Carlos E. Otero, The University of Virginia's College at Wise, USA
Ching-Hsien Hsu, Chung Hua University, Taiwan
Denivaldo Lopes, Federal University of Maranhao, Brazil
Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Australia
Gurdev Singh, Adesh Institute of Engineering & Technology, India
Hani H. Qusa, University College of Applied Sciences, Palestine
Henrique Joao Lopes Domingos, New University of Lisbon, Portugal
Hossain Shahriar, Kennesaw State University, USA
Ihab A. Ali, Helwan University, Egypt
Isaac Agudo, University of Malaga, Spain
Ismael Etxeberria-Agiriano, University of the Basque Country, Spain
Jaydip Sen, Tata Consultancy Services, India
Jeong-Hyun Park, Electronics Telecommunication Research Institute, South Korea
Jose Enrique Armendariz-Inigo, Universidad Publica de Navarra, Spain
Jungwook Song, Konkuk University, South Korea
M Rajarajan, City University, United Kingdom
M. B. Ghaznavi-Ghoushchi, Shahed University, Iran
http://airccse.org/journal/ijnsa.html
Editorial Board
Madhan KS, Infosys Technologies Limited, India.
Madhavi Latha, Jawaharlal Nehru Technological University, India
Mahdi Aiash, Middlesex University, London - United Kingdom
Manabu Okamoto, Kanagawa Institute of Technology, Japan
Marc Rader, Capella University, USA
Marjan Gusev, Univ. Sts Cyril and Methodius, Macedoni
Mina Rahbari, Islamic Azad University, Iran
Mohammad A. Alia, Al Zaytoonah University of Jordan, Jordan
Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran
Mohammad Momani, University of technology Sydney, Australia
Mritunjay Rai, Indian Institute of Information Technology and Management, India
Narendra Kr Pareek, Mohanlal Sukhadia University, India
Natarajan Meghanathan, Jackson State University, USA
R.Ramesh, Anna University, India
Raja Kumar M, Universiti Sains Malaysia, Malaysia
Ram Kumar Singh, Swami Vivekanand Subharti University, India
S. K. Ghosh, Indian Institute of Technology, India
Saad M. Darwish, Alexandria University, Egypt
Salman Abdul Moiz, Centre for Development of Advanced Computing, India
Sarah M. North, Kennesaw State University, USA
Santosh Biswas, Indian Institute of Technology Guwahati, India
Shekoofeh Ghiam, Sharif University of Technology, Iran
Sherif S. Rashad, Morehead State University, USA
Susantha Herath, St. Cloud State University, USA
Talal Mousa Alkharobi, King Fahd University of Petroleum & Minerals, Saudi Arabia
V. Lakshmi Narasimhan, East Carolina University, USA
William R Simpson, The Institute for Defense Analyses, USA
Xiaohong Yuan, North Carolina A&T State University, USA
Yasir Arfat Malkani, University of Sindh, Pakistan
Yeong Deok Kim, WooSong University , South Korea
Zakaria Saleh, Yarmouk University, Jordan
Roka Imareef, University of Sabha, Libya
Nameer Emam, Philadelphia University, Jordan
Asimi Ahmed, Ibn Zohr University, Morocco
Hasan Alsakran, King Saud University, Saudi Arabia
http://airccse.org/journal/ijnsa.html
Paper Submission & Manuscript preparation Guide
Authors are invited to submit papers for this journal through E-mail ijnsa@airccse.org.
Submissions must be original and should not have been published previously or be under
consideration for publication while being evaluated for this Journal. For paper format
download the template in this page

Manuscript Template

Review Process
Submissions are accepted for review with the understanding that the same work has been
neither submitted to, nor published in, another publication. Simultaneous submission to other
publications will result in immediate rejection of the paper. Papers are not within the journal
scope will be rejected immediately after the pre review process.

All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing
procedure, and are considered on the basis of their significance, novelty and usefulness to the
Journals readership. The reviewing structure will always ensure the anonymity of the referees
& it will be reviewed by 3 experts in the field. The review output will be one of the following
decisions:

1. Accept
2. Accept with minor changes
3. Weak Accept with major changes
4. Reject

The review process may take approximately two to three months to be completed. The Editor
reserves the right to reject a paper if it does not meet the aims and scope of the journal and if
it is not revised as per instructions.

Copy right form


After submitting final manuscript, you can get copy right form from AIRCC secretary

Publication charges: 120 USD (Maximum 20 pages)


Publication Frequency - Bi Monthly
January, March, May, July, September, November

Special Issue Proposal


IJNSA invite proposals for special issues on topics that fall within the scope of this journal.
You can send your proposal directly to editor in chief & secretary, AIRCC by email

Contact Us
Here's where you can reach us : ijnsa@airccse.org

http://airccse.org/journal/ijnsa.html
Volume 1, Number 1, April 2009

S.No Paper Title Citation

Using Rough Set and Support Vector Machine for Network Intrusion Detection
1 Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, Chaoyang University of 97
Technology,Taiwan, R.O.C

Tools and Techniques for Network Forensics


2 Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Jackson State 51
University,USA

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its
Modified Version using Digital Images
3 19
Krishnamurthy G N, Dr. V Ramaswamy,Bapuji Institute of Engineering &
Technology, India

A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of
4 Simplified Data Encryption Standard Algorithm 73
Poonam Garg,Institute of Management Technology, India

A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc
Networks
5 Debdutta Barman Roy,Rituparna Chaki,Nabendu Chaki,Calcutta Institute of 84
Engineering and Management, India, West Bengal University of Technology,India,
University of Calcutta,India

Volume 1, Number 2, July 2009

Iterative method for improvement of coding and decryption


6 Natasa Zivic, Institute for Data Communication Systems, University of 04
Siegen,Germany

Tools A new key establishment Scheme for wireless sensor networks


7 Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, Department of Computer Science, The 04
University of Hong Kong, Hong Kong

Dynamic IDP signature processing by fast elimination using DFA

Mohammed Misbahuddin, Sachin Narayanan and Bishwa Ranjan Ghosh,Computer


8 03
Networks & Internet Engineering
Division, Centre for Development of Advanced Computing, Bangalore, India

Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless


packet networks
9
G.M.Tamilselvan and A.Shanmugam,Bannariamman Institute of
09
Technology,Tamilnadu, India

Clustered Hierarchy in Sensor Networks: Performance and Security

10 Mohammed Abuhelaleh, Khaled Elleithy and Thabet Mismar, School of Engineering, 01


University of Bridgeport USA
Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States
Yoshito Kanamori1and Seong-Moo Yoo 2, 1University of Alaska Anchorage, Alaska,
11 06
USA, 2The University of Alabama
in Huntsville, Alabama, USA

Intelligent Intrusion Detection System Framework Using Mobile Agents


12 N.Jaisankar, R.Saravanan and K. Durai Swamy, School of Computing Sciences, VIT 19
University, India

On Generation of Firewall Log Status Reporter (SRr) Using Perl


13 Sugam Sharma1, Hari Cohly2, and Tzusheng Pei2, 1Iowa State University, 09
USA, 2Jackson State University, USA

Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and
Integration
14 27
Alan Mink, Sheila Frankel and Ray Perlner, National Institute of Standards and
Technology (NIST), USA

Volume 1, Number 3, October 2009

Integrating Identity-Based Cryptography in IMS Service Authentication


15 Mohamed Abid1, Songbo Song2, Hassnaa Moustafa2 and Hossam Afifi1, 1Telecom & 07
Management SudParis ,Evry, France

Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
16 E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger & V.Ramachandran, VIT 09
University,INDIA.

Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication
Scheme
17 17
Mohammed Aijaz Ahmed1, D. Rajya Lakshmi2 and Sayed Abdul Sattar3, GITAM
University, India

PSIM: A Tool for Analysis of Device Pairing Methods


18 05
Yasir Arfat Malkani and Lachhman Das Dhomeja, University of Sussex, Brighton, UK

Data Security in Mobile Devices by GEO Locking


19 04
M Prabu Kumar and K Praneesh Kumar Yadav, VIT University, India

Performance Evaluation of a New Route Optimization Technique for Mobile IP


20 Moheb r. Girgis, Tarek m. Mahmoud,Youssef s. Takroni and hassan s. Hassan,Minia 01
University, Egypt

Security Properties in an Open Peer-to-Peer Network


Jean-Francois Lalande, David Rodriguez, Christian Toinard,Laboratoire
21 03
DInformatique Fondamentale DOrleans, Universite, DOrleans, Ensi de Bourges,
France

A Security Framework for SOA Applications in Mobile Environment

22 Zair Abdelouahab,Federal University of Maranhao, CCET/DEEE Av. Dos 15


portugueses, Campus do Bacanga, Sao Luis, Brazil
Securing AODV for MANETs using Message Digest with Secret Key
23 Kamaljit Lakhtaria,Bhaskar N. Patel, Satish G. Prajapati,N. N. Jani, Atmiya Institute 08
of Technology & Science, India

Application Specific Usage control Implementation Verification


24 Rajkumar P.V, S.K.Ghosh and Pallab Dasgupta Indian Institute of Technology- 03
Kharagpur, India

Volume 2, Number 1, January 2010

Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc


25 Networks 09
James Cannady, Nova Southeastern University, USA

A Frame Work for Ontological Privacy Preserved Mining


26 08
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch, VIT University, India.

Workload Characterization of Spam Email Filtering Systems


27 07
Yan Luo, University of Massachusetts Lowell, USA

Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video
28 Cover Media 61
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA

Weakness on Cryptographic Schemes Based on Regular LDPC Codes


Omessaad Hamdi1 , Manel abdelhedi2, Ammar Bouallegue2 and Sami
29 00
Harari3, 1SYSTEL, SUPCOM, Tunisia, 2SYSCOM, ENIT, Tunisia and 3SIS, USTV,
France.

Advanced Security Management in Metro Ethernet Networks


30 0
Ammar Rayes, Cisco Systems, USA

Combining Private and Public Key Encryption Techniques for Providing Extreme Secure
Environment for an Academic Institution Application
31 1 07
Syed S. Rizvi, 2Aasia Riasat and 3Khaled M. Elleithy, 1,3University of Bridgeport, USA
and 2Institute of Business Management, Pakistan.

Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage


32 Architectures 01
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon

Volume 2, Number 2, April 2010

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem


33 Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology, 05
Guwahati, India

Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

34 Dewan Md. Farid1, Nouria Harbi1, and Mohammad Zahidur Rahman2, 1University 96
2
Lumiere Lyon 2 - France and Jahangirnagar University, Bangladesh
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
35 Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, 24
EGYPT

Fuzzy Aided Application Layer Semantic Intrusion Detection System FASIDS


36 S.Sangeetha1 & V.Vaidehi2, 1Angel College of Engineering, India and 2Madras Institute 07
of Technology, India

Events Classification in Log Audit


37 07
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait

Analysis of the Security of BB84 by Model Checking


Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi13, 1FSO, University
38 14
Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist,Morocco and 3Academy
Hassan II of Sciences & Technology, Morocco

Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor


Mohsen Machhout1, Zied Guitouni1, Kholdoun Torki2, Lazhar Khriji3 and Rached
39 15
Tourki1, 1Faculty of Sciences of Monastir,
Tunisia, 2TIMA - CMP Laboratory, France and 3Sultane Qaboos University, Oman

Impersonation Attack on EKE Protocol


40 03
Shirisha Tallapally , Vaagdevi College of Engineering, India

A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical


41 Curve Cryptogaphy for Energy -Constrained Devices 04
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore

Trust Based Content Distribution for Peer-To-Peer Overlay Networks


42 S.Ayyasamy1 and S.N. Sivanandam2, 1Tamilnadu College of Engineering, India 06
and 2PSG College of Technology, India

Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET


43 T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology, 26
Sathyamangalam,India

Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
44 24
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France

Volume 2, Number 3, July 2010

A Novel Web-based Approach for Balancing Usability and Security Requirements of Text
45 Passwords 02
Dhananjay Kulkarni, Boston University, USA.

Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next


Generation High Rate WPAN
46 Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of Electronics 12
and Telecommunications of Rennes
(IETR), France.

Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers


47 0
Chang N. Zhang, Qian Yu and Xiao Wei Liu, University of Regina, Canada.
Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs
Theodore Zahariadis1, Helen Leligou1, Panagiotis Karkazis4,Panagiotis Trakadas2,
Ioannis Papaefstathiou4,Charalambos Vangelatos3 and Lionel Besson4, 1Technological
48 Educational Institute of Chalkis, Greece, 2 Hellenic Authority for 46
Communications Security and Privacy (ADAE), Greece, 3Hellenic Aerospace Industry
S.A., Greece, Thales Communications, France and 4Technical University of Crete,
Greece.

Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics


Timers
49 05
Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant, University of
Mauritius.

Improving TLS Security By Quantum Cryptography


Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi3, 1FSO, University
50 05
Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist,Morocco and 3Academy
Hassan II of Sciences & Technology, Morocco.

Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network
51 Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2, 1Stamford University, 43
Bangladesh and 2American International University, Bangladesh.

Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc


Network
52 01
S. Albert Raebra1 and S. Vijayalakshmi2, 1St.Josephs College, Bharathidasan
University, India and 2Pondicherry University, India

An Efficient IP Traceback Through Packet Marking Algorithm


53 08
Y.Bhavani and P.Niranjan Reddy, Kakatiya Institute of Technology and Science,India.

Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security
Applications in Constrained Network Environment
54 08
K R Chandrasekhara Pillai1 and M P Sebastian2,1N S S College of Engineering,India
and Indian Institute of Management, India

Wireless Security Measurement Using Data Value Index


Reza Amirpoor, Ajay Kumar and Satish R. Deavne ,Bharati Vidyapeeth
55 0
University,India, JSPMs JAYAWANT Institute of Computer Applications,India
and DR.D. Y. Patil Ramrao Adik Institute of Technology, India.

An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error
Concealment
56 0
Amit Phadikar and Santi P. Maity , MCKV Institute of Engineering,India
and Bengal Engineering and Science University, India

Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services
Urjita Thakar, Nirmal Dagdee and Sudarshan Varma, Shri G.S. Institute of
57 15
Technology and Science,India, S.D. Bansal College of Technology,India and Ideavate
Solutions, USA.

Volume 2, Number 4, October 2010

A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features


Angel R. Otero, Carlos E. Otero and Abrar Qureshi, Nova Southeastern University,
58 20
USA and University of Virginia's
College at Wise, USA
Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-
Authentication Option FIeld:A Characterization
59 06
Danilo Valeros Bernardo and Doan B Hoang, The University of Technology- Sydney,
Australia

Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique


60 M. Kiran Kumar, S. Mukthyar Azam and Shaik Rasool, R.V.R & J.C College of 31
Engg, India and S.C.E.T, India

Verification of Quantum Cryptography Protocols by Model Checking


Mohamed Elboukhari, Mostafa Azizi and Abdelmalek Azizi,, FSO, University
61 02
Mohamed Ist, Morocco, ESTO, University
Mohamed Ist, Morocco and Academy Hassan II of Sciences & Technology, Morocco

Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor
Networks
62 03
Vivaksha Jariwala and D. C. Jinwala, C. K. Pithawalla College of Engineering and
Technology, India and S. V. National Institute of Technology, India

Security in Wireless Sensor Networks: Key Management Module in SOOAWSN


63 26
Mohammed A. Abuhelaleh and Khaled M. Elleithy, University Of Bridgeport, USA

Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless
64 Sensor Network 00
Vikas Kumar and Rajender Kumar, NIT- kurukshetra, India

A Distributed Trust Management Framework for Detecting Malicious Packet Dropping


65 Nodes in a Mobile Ad Hoc Network 14
Jaydip Sen, Tata Consultancy Services Ltd - Kolkata, India

Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session
Key Agreement for Multi-Server Environment
66 Rafael Martinez-Pelaez,, Francisco Rico-Novella, Cristina Satizabal2 and Jacek 05
Pomykala, Technical University of Catalonia, Spain, Universidad de la Sierra Sur,
Mexico and Warsaw University, Poland

A (2,N) Visual Cryptographic Technique for Banking Applications


67 Jayanta Kumar Pal, J. K. Mandal and Kousik Dasgupta, Kalyani Government 13
Engineering College, India and University of Kalyani, India

Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents
68 Mueen Uddin, Kamran Khowaja and Azizah Abdul Rehman, UTM, Malaysia 24
and 2Isra University, Pakistan

A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks


69 Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and 07
Christos Politis, Kingston University - London, United Kingdom

Lightweight C&C based botnet detection using Aho-Corasick NFA


70 Udhayan J, Anitha R and Hamsapriya T, Karunya University, India and PSG 06
College of Technology, India
Emergency Response Communications and Associated Security Challenges
71 Muhammad Ibrahim Channa and Kazi M. Ahmed, Asian Institute of Technology,
10
Thailand

A Formal Verification Framework for Security Policy Management in Mobile IP Based


WLAN
72 02
Soumya Maity, P Bera, S K Ghosh and Pallab Dasgupta, Indian Institute of Technology
- Kharagpur, India

Effective Voice Calls Admission for Authorized User in Inter VOIP Network
73 Subashri T and Vaidehi V, Anna University - Chennai, India 0

ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan
74 Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing 04
(C-DAC), India

Improving the Reliability of Detection of LSB Replacement Steganography


75 Shreelekshmi R, Wilscy M and C E Veni Madhavan, College of Engineering - 0
Trivandrum, India, University of Kerala, India and Indian Institute of Science, India

Zero Data Remnance Proof in Cloud Storage


76 3
Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India

Bayesian Based Comment Spam Defending Tool


Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran and Jae Kwang Lee, Wireilla
77 2
Net Solutions, Australia and Hannam University, South Korea

Volume 3, Number 1, January 2011

Virtual Machines And Networks - Installation, Performance, Study, Advantages And


78 Virtualization Options 19
Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA

Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic
Algorithm For VOIP
79 Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University 01
Teknologi Malaysia, Malaysia

An Ov erview Of The Security Concerns In Enterprise Cloud Computing


80 Anthony Bisong and Syed (Shawon) M. Rahman, Capella University,USA 182
and University of Hawaii-Hilo, USA

A Human-Centric Approach To Group-Based Context-Awareness


Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad
81 08
A. Nematbakhsh, University of Isfahan,
Iran
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas
82 Sector 14
Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK

Failure of A Mix Network


83 03
Kun Peng, Institute for Infocomm Research, Singapore

Analysis of Web Logs And Web User In Web Mining


84 L.K. Joshila Grace, V.Maheswari and Dhinaharan Nagamalai, Sathyabama 96
University, India and Wireilla Net Solutions PTY Ltd, Australia

Volume 3, Number 2, March 2011

A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks
85 Mohammed Mana, Mohammed Feham and Boucif Amar Bensaber, University of 11
Tlemcen, Algeria andUniversite du Quebec a Trois-Rivieres, Canada

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication


Scheme Using Smart Cards
86 18
Ashok Kumar Das, International Institute of Information Technology - Hyderabad,
India

Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed


Data into Image using Variable Length Key
87 Sabyasachi Samanta, Saurabh Dutta and Goutam Sanyal, Haldia Institute of 02
Technology, India, Dr. B. C. Roy Engineering College - Durgapur, India and National
Institute of Technology - Durgapur, India

The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations
88 08
Harry Yosh, HECO Ltd - Canberra, Australia

Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network
Intrusion Collaborative System
89 Renuka Prasad.B, Annamma Abraham, Abhas Abhinav, Sunil.V.Gurlahosur and 01
Srinivasa Y, R.V.College of Engineering, India, BMSIT - Bengaluru,
India, DeepRootLinux Pvt Ltd, India, SIT - Tumkur, India

Confidentiality & Authentication Mechanism for Biometric Information Transmitted over


90 Low Bandwidth & Unreliable channel 06
Raju Singh and A.K.Vatsa, Shobhit University, India.

Investigating the Combination of Text and Graphical Passwords for a more secure and usable
91 experience 09
C Singh, L Singh and E Marks, University of Guyana

Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption


92 Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of 07
Technology - Durgapur, India

A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And
Session Based Password
Tanmay Bhattacharya, Sirshendu Hore, Ayan Mukherjee and S. R. Bhadra
93 02
Chaudhuri, JIS College Engineering, India, Hooghly Engineering & Technology
College, India, Institute of Science & Technology, India and Bengal Engineering
& Science University, India
Replication Attack Mitigations for Static And Mobile WSN
94 19
V.Manjula and C.Chellappan, Anna University - Chennai, India

Stage Staffing Scheme for Copyright Protection In Multimedia


95 Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology - 0
Guwahati, India

Substitution-diffusion based Image Cipher


96 Narendra K Pareek, Vinod Patidar and Krishan K Sud, M L Sukhadia University - 14
Udaipur, India and Sir Padampat Singhania University, India

A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers
97 12
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India

Image Encryption Based On Diffusion And Multiple Chaotic Maps

98 G.A.Sathishkumar, K.Bhoopathy bagan and N.Sriraam, Sri Venkateswara College 35


of Engineering, India, Madras Institute of Technology, India and SSN College of
Engineering, India

A QoS Based MAC Protocol For Wireless Ad-hoc Network


99 Vandana khare, D.SrinivasRao and Y.Madhavee Latha, CMEC - Hyd, 0
India, JNTUH - Hyd, India and MRECW - Hyd, India

Volume 3, Number 3, May 2011

System Dynamics Based Insider Threats Modeling


100 08
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China

Countermeasure Tool - Carapace for Network Security


101 Anand Bisen, Shrinivas Karwa and B.B. Meshram, Veermata Jijabai Technological 01
Institute, India

On Design of PUF-Based Random Number Generators


102 Mehdi Ayat, Reza Ebrahimi Atani and Sattar Mirzakuchaki, Iran University of 03
Science and Technology, Iran and The University of Guilan, Iran

Credential Based Mediator Architecture for Access Control and Data Integration in Multiple
103 Data Sources Environment 05
Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India

Data Security Using Private Key Encryption System Based on Arithmetic Coding
104 28
Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India

PKI in Government Identity Management Systems


105 10
Ali M. Al-Khouri, Emirates Identity Authority, United Arab Emirates

Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN
106 Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi 00
Pradhan, NM Institute of Engineering and Technology, India
Authentication Schemes for Session Passwords Using Color and Images
107 M Sreelatha, M Shashi, M Anirudh, Md Sultan Ahamer and V Manoj 50
Kumar, RVR & JC College of Engineering, India
and Andhra University College of Engineering, India

Transformation from Identity Stone Age to Digital Identity


108 Mohit Kohli, Rolta Technology Limited (RIL), India 02

Enterprise Delegation for Service Based Systems

109 Coimbatore Chandersekaran and William R. Simpson, The Secretary of the Air 0
Force, USA and The Institute for Defense Analyses, USA

An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its
Verification
110 04
Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of
Technology - Guwahati, India

DDoS Attack and Defense Scheme in Wireless Ad hoc Networks


111 40
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India

TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for
MANET
112 Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt 04

Volume 3, Number 4, July 2011

Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network
113 Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen, 32
Algeria

Wavelet Thresholding Approach For Image Denoising


114 Pankaj Hedaoo and Swati S Godbole, G. H. Raisoni College of Engineering, Nagpur, 44
India.

Architecture Of A Identity Based Firewall System


115 Nenad Stojanovski and Marjan Gusev, Makedonski Telekom AD, Orce Nikolov BB, 07
1000 Skopje, Macedonia and Ss. Cyril and Methodius University, Macedonia

Cryptovirology: Virus Approach


116 Shivale Saurabh Anandrao, Vishwakarma Institute Of Information Technology - Pune, 02
India

Security Apprehensions In Different Regions Of Cloud Captious Grounds


117 Gurdev Singh Amit Sharma and Manpreet Singh Lehal, Eternal University, HP 15
India and Lyallpur Khalsa College, India
A Novel Header Matching Algorithm For Intrusion Detection Systems
Mohammad A. Alia, Adnan A. Hnaif, Hayam K. Al-Anie, Khulood Abu Maria,
118 01
Ahmed M. Manasrah and M. Imran Sarwar, Al Zaytoonah University, Jordan, Al
Yarmouk University, Jordon and Universiti Sains Malaysia, Malaysia

A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing


119 S.S. Prasad, Rithika Baruah and Siddharth.A, National Institute of Technology, 0
Jamshedpur, India

E-Voting Protocol Based On Public-Key Cryptography


120 Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif, Al Zaytoonah University, 12
Jordan

Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using


Various Optimization Techniques as Well as Network Management Models Giving Special
121 01
Emphasis To Attack Tree Model
Prabhat Kumar Vishwakarma, University of Gondar, Ethiopia

Governing Information Security In Conjunction With Cobit And Iso 27001

122 Tolga Mataracioglu and Sevgi Ozkan, TUBITAK National Research Institute of 17
Electronics and Cryptology (UEKAE), Turkey and Middle East Technical University,
Turkey

An Evaluation Of Fingerprint Security Using Noninvertible Biohash


123 N.Radha and S.Karthikeyan, Karpagam University, India and College of Applied 15
Sciences, Sultanate of Oman

RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
124 02
R. Ramesh and S. Gayathri, Anna University, India

An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of


125 Encryption On Mac Layer 02
Gulshan Kumar and Mritunjay Rai, Lovely Professional University, Jalandhar, India.

An Ancient Indian Board Game as a Tool for Authentication


Sreelatha Malempati and Shashi Mogalla, RVR & JC College of Engineering,
126 03
Guntur, A.P and Andhra University
College of Engineering, Visakhapatnam, A.P

Ensemble of Blowfish With Chaos Based S Box Design For Text And Image Encryption
127 Jeyamala Chandrasekaran Subramanyan B and Raman G.S, Thiagarajar College of 09
Engineering, Madurai and KLN College of Information Technology, Madurai

Volume 3, Number 5, September 2011

Information Security Synthesis in Online Universities


128 10
Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA

A Multiple Ballots Election Scheme Using Anonymous Distribution


129 01
Manabu Okamoto, Kanagawa Institute of Technology, Japan
Enhanced Secure Algorithm for Message Communication
130 01
Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India

Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
131 0
Vikram Singh and Vatika, Chaudhary Devi Lal University, India

An ISP Based Notification and Detection System to Maximize Efficiency of Client


132 Honeypots in Protection of End Users 0
Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand

Simulation of the Combined Method


133 00
Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia

Prevention of Wormhole Attack in Wireless Sensor Network


134 Dhara Buch and Devesh Jinwala, Government Engineering College Rajkot, India 19
and S.V. National Institute of Technology, India

DDNFS: A Distributed Digital Notary File System


135 00
Alexander Zanger, Bond University, Australia

Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN


136 00
R.Seshadri and N. Penchalaiah, S.V.University, India and ASCET, India

Handwritten Text Image Authentication Using Back Propagation


137 A S N Chakravarthy, Penmetsa V Krishna Raja and P S Avadhani, Sri Aditya 04
Engineering College, India, JNTUK, India and Andhra University, India

A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks


138 18
Hossein Jadidoleslamy, The University of Guilan, Iran

BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks


139 17
Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
140 Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi, 04
GLS Institute of Computer Technology, India

Botnet Command Detection using Virtual Honeynet


141 12
J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India

CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN
142 spoofing attack 06
L.Kavisankar and C.Chellappan, Anna University, India

Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks


usingReed Solomon Code for Key Predistribution
143 01
Pinaki Sarkar and Aritra Dhar, Jadavpur University, India and Gurunanak
Institute of Technology, India
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key
cryptography
144 04
G.Geetha and C.Jayakumar, Jerusalem college of Engineering, India and RMK
Engineering college, India

Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication


Mechanism
145 16
Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela,
India

Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for
MANET
146 03
V. Anjana Devi and R. S. Bhuvaneswaran, St. Joseph's College of Engineering, India
and Anna University, India

Error Detection and Correction for Distributed Group Key Agreement Protocol
147 0
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India

Volume 3, Number 6, November 2011

Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information


Theoretic Security
148 02
William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai,
India

An Overview of Penetration Testing


Aileen G. Bacudio, Xiaohong Yuan, Bei-Tseng Bill Chu and Monique Jones, North
149 Carolina A&T State University, USA and University of North Carolina at Charlotte, 27
USA

The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

150 Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, 0
India

Enhancing Infrastructure Security in Real Estate


151 09
Kyle Dees and Syed (Shawon) Rahman, Capella University, USA

Implementation of Cryptographic Algorithm for GSM and UMTS Systems.


152 Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National 07
Institute of Technology, India

Role of Multiple Encryption in Secure Electronic Transaction


153 Himanshu Gupta and Vinod Kumar Sharma, Amity University Campus, India 19
and Gurukula Kangri Vishwavidyalaya, India

Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
154 Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and 12
Development Organisation (DRDO) - Bangalore, India
Statistical Quality Control Approaches to Network Intrusion Detection
155 Rohitha Goonatilake, Rafic Bachnak and Susantha Herath, Texas A&M 02
International University, USA and St. Cloud State University, USA

Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller
Codes for Wireless Sensor Networks
156 01
Pinaki Sarkar, Amrita Saha and Samiran Bag, Jadavpur University, India, IIT
Bombay, India and Indian Statistical Institute, India

Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
157 P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra 00
University, India

User Authentication using Native Language Passwords


158 Sreelatha Malempati and Shashi Mogalla, R.V.R. & J.C. College of Engineering, 03
India and Andhra University College of Engineering, India

Prediction of Malicious Objects in Computer Network and Defense


159 Hemraj Sainia, T. C. Panda and Minaketan Panda, Alwar Institute of Engineering 05
& Technology, India, Orissa Engineering College, India and SPANCO TELE, India

Blind Signature Scheme Based on Chebyshev Polynomials


160 01
Maheswara Rao Valluri, Salalah College of Technology, Oman

Efficient Detection of Sybil attack Based on Cryptography in Vanet


161 26
Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm


162 20
Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India

Experimenting with the Novel Approaches in Text Steganography

163 Shraddha Dulera, Devesh Jinwala1 and Aroop Dasgupta, S V National Institute of 10
Technology, India and Bhaskaracharya Institute for Space Applications and Geo-
Informatics, India

Techniques and Tools for Forensic Investigation of E-mail


164 13
M. Tariq Banday, University of Kashmir, India

Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible
Key Generation Algorithm
165 05
S.G.Srikantaswamy and H.D.Phaneendra, National Institute of Engineering -
Mysore, India and CSE NIE - Mysore, India

An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS


166 K.Kuppusamy and S.Malathi, Alagappa University, India and Manonmaniam 07
Sundaranar University, India

Securing Mobile Agents in MANET against Attacks using Trust


167 03
Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India
Volume 4, Number 1, January 2012

Optimizing One Fair Document Exchange Protocol


168 03
Abdullah M. Alaraj, Qassim University, Saudi Arabia

IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
169 K.Munivara Prasad, A.Rama Mohan Reddy and V Jyothsna, Rayalaseema 10
University, India, SV University, India and Sree vidyanikethan Engg.College, India

Protected Data Objects Replication in Data Grid


170 G. Aruna Kranthi and D. Shashi Rekha, S.R. Engineering College - Warangal, India 0
Erratum : Due to a serious case of plagiarism this paper has been retracted.

Efficient & Secure Data Hiding Using Secret Reference Matrix


171 Laxman Tawade, Rajshree Mahajan and Chandan Kulthe, Pune University, India 04
and Aditya Engineering College, India

Risks and Remedies in E-Learning System


172 28
Nikhilesh Barik and Sunil Karforma, Burdwan University, India

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized


Security in Enterprise Networks
173 19
Priyank Singhal and Nataasha Raul, Sardar Patel Institute of Technology - University
of Mumbai, India

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc
Network
174 03
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women,
India

Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks


175 Sridhar Subramanian and Baskaran Ramachandran, Easwari Engineering College - 18
Chennai, India and Anna University - Chennai, India

A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
176 01
Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India

A Security Suite for Wireless Body Area Networks


Raghav V. Sampangi, Saurabh Dey, Shalini R. Urs and Srinivas Sampalli,
177 21
Dalhousie University, Canada, Analytics Quotient Bangalore, India and 3University of
Mysore, India

A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct
178 Misbehaviour in Routing 02
G.S. Mamatha, R.V. College of Engineering Bangalore, India

The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum
Copying Machine
Besma Othmani, Mohsen Machhout, Houcine Mejri,, Hafedh Belmabrouk and Rached
179 0
Tourki, Laboratoire d'Electronique et Micro Electronique Faculte des Sciences de Monastir,
Tunisia and Ecole Preparatoire aux Academies Melitaires, Tunisia
Volume 4, Number 2, March 2012

A Generic Framework for Device Pairing in Ubiquitous Computing Environments


180 Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja, 01
University of Sussex, UK

LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
181 01
Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India

Cross Layer Intrusion Detection System for Wireless Sensor Network


182 Djallel Eddine Boubiche and Azeddine Bilami, LaSTIC Laboratory - UHL Batna, 25
Algeria

Minimizing the Time of Spam Mail Detection by Relocating Filtering System to the Sender
Mail Server
183 03
Alireza Nemaney Pour, Raheleh Kholghi and Soheil Behnam Roudsari,Islamic Azad
University of Abhar, Iran and Sharif University of Technology, Iran

A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives
in Ids
184 03
G.Jacob Victor, M Sreenivasa Rao and V.CH. Venkaiah, SERP - RD Department,
India, JNTU - Hyderabad, India and CRRao AIMS & CS - Hyderabad, India

Cloud Computing Security in Business Information Systems


185 Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Ss. Cyril and Methodius 28
University, Macedonia

Design and Analysis of a Novel Digital Image Encryption Scheme


186 27
Narendra K Pareek, M L Sukhadia University, India

An Implementation of Intrusion Detection System Using Genetic Algorithm


187 Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, Shahjalal 183
University of Science and Technology, Bangladesh

Forensic Analysis of Windows Registry Against Intrusion


188 Haoyang Xie, Keyu Jiang, Xiaohong Yuan and Hongbiao Zeng, Fort Hays State 08
University, USA and North Carolina A&T State University, USA

LPM: A Distributed Architecture and Algorithms for Location Privacy in LBS


189 03
Muhamed Ilyas and R. Vijayakumar, Mahatma Gandhi University Kottayam, India

Co-operative Wireless Intrusion Detection System Using MIBs From SNMP


190 Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar, College of 02
Engineering - Pune, India

Lattice Based Tools in Cryptanalysis for Public Key Cryptography


191 R.Santosh Kumar, C.Narasimham and S.Pallam Setty, MVGR College of Engg., 03
India, VR Siddhartha Engineering College, India and Andhra University, India

Identification of Image Spam by Using Low Level & Metadata Features


192 Anand Gupta, Chhavi Singhal and Somya Aggarwal, Netaji Subhas Institute of 02
Technology, India
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
193 S. Sree Vivek, S. Sharmila Deva Selvi, V. Radhakishan, C. Pandu Rangan, IIT 79
Madras, India and NIT Trichy, India

Passblot: A Highly Scalable Graphical one Time Password System


194 Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V 05
Gangashetty, IIIT - Hyderabad, India

Volume 4, Number 3, May 2012

Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion
Detection Systems
195 05
Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse
Toulouse, France

Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
196 Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and 13
Technology Noida, India

Security Threats Analysis in Bluetooth-Enabled Mobile Devices


197 03
Robayet Nasim, University of Science & Technology Chittagong, Bangladesh

Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under
Water Acoustic Sensor Networks
198 03
Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of
Engineering Chennai, India

The New Age of Computer Virus and Their Detection


199 Nitesh Kumar Dixit, Lokesh mishra, Mahendra Singh Charan and Bhabesh Kumar 05
Dey, BIET Sikar, India and NCAC Sikar, India

Provable Secure Identity Based Signcryption Schemes without Random Oracles


200 Prashant Kushwah and Sunder Lal, Banasthali University, India and Veer Bahadur 09
Singh Purvanchal University, India

Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and


201 Transformation 05
P. Devaki and G. Raghavendra Rao, NIE Mysore, India

Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
202 09
P.Natesan and P.Balasubramanie, Kongu Engineering College, India

Volume 4, Number 4, July 2012

Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining


Replication and Diversity
Charles A. Kamhoua, Patrick Hurley, Kevin A. Kwiat and Joon S. Park, Air Force
203 02
Research Laboratory - Information
Directorate, USA and Syracuse University, USA
Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP
204 0
Abdullah AlOtaibi and Hamza Aldabbas, De Montfort University, United Kingdom

Evaluation of Security Attacks on UMTS Authentication Mechanism


205 Mojtaba Ayoubi Mobarhan, Mostafa Ayoubi Mobarhan and Asadollah Shahbahrami, 19
University of Guilan, Iran

Non-Profit Organizations' Need to Address Security for Effective Government Contracting


Lee E. Rice and Syed (Shawon) M. Rahman,, Capella University,USA
206 07
and University of Hawaii-Hilo, USA

A Novel Energy Efficient and Administrator Based Secured Routing in MANET


207 Himadri Nath Saha, Debika Bhattacharyya and P. K.Banerjee, Institute of 02
Engineering and Management West Bengal, India and Jadavpur university, India

Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
208 02
S.Karthika, A.Kiruthiga And S.Bose, Anna University, India

How to Avoid the N-1 Attack Without Costly Implementations


209 0
David Tinoco Varela, Universidad Nacional Autonoma de Mexico, Mexico

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance
the Information Security
210 06
Manas Paul and Jyotsna Kumar Mandal, JIS College of Engineering, India
and Kalyani University, India

Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System
211 TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar, King Fahd University 0
of Petroleum & Minerals(KFUPM), Saudi Arabia

A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping


212 Binary Exponential Backoff IEEE 802.15.4 01
Archit Verma Pushpinder Singh Patheja and Akhilesh Waoo, BIST Bhopal, India

An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In


Wireless Sensor Networks
213 10
A. Forootaninia and M. B. Ghaznavi-Ghoushchi, Tehran University, Iran
and Shahed University, Iran

Personal Safety Triggering System on Android Mobile Platform


214 Ashokkumar Ramalingam, Prabhu Dorairaj and Saranya Ramamoorthy, Blekinge 12
Institute of Technology, Sweden

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks


215 Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Middlesex University, UK 15

Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs


with the Theory of Games
216 Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar 0
Volume 4, Number 5, September 2012

Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
Abudhahir Buhari, Zuriati Ahmad Zukarnain, Shamala K. Subramaniam, Hisham
217 0
Zainuddin and Suhairi Saharudin, University Putra Malaysia, Malaysia
and Technology Park Malaysia, Malaysia

Comparison of High Speed Congestion Control Protocols


218 Jawhar Ben Abed, Laarif Sinda, Mohamed Ali Mani and Rachid Mbarek, Polytech 04
Sousse, ISITCOM Hammam Sousse and ISTLS Sousse, Tunisia

Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts
219 01
Priyanka Dey and Suparna Biswas, West Bengal University, India

A Framework For Performance Evaluation Of ASIPs in Network-Based IDS


220 Majid Nezakatolhoseini and Mohammad Amin Taherkhani, Science and Research 01
Branch Islamic Azad University, Iran and Shahid Beheshti University, Iran

Design And Validation Of Specification Based Ids For Power Enhancement Related
221 Vulnerabilities In AODV 0
Chaitali Biswas Dutta and Utpal Biswas, University of Kalyani, India

Security V/S Qos for LTE Authentication and Key Agreement Protocol
222 Jacques Bou Abdo, Jacques Demerjian and Hakima Chaouchi, Nokia Siemens 09
Networks, Lebanon, Antonine University, Lebanon and Telecom Sud Paris, France

Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and


Acquisition of Companies
223 01
Balachandra Muniyal, Prema K.V and Mamatha Balachandra, Manipal University,
India and Modi Institute of Technological Sciences, India

Healthcare IT: Is Your Information At Risk?


224 Kimmarie Donahue and Syed (Shawon) M. Rahman, San Antonio, USA and Capella 05
University, USA

A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications


225 05
H.Jayasree and A.Damodaram, ATRI, India and JNTUH - Kukatpally, India

A Survey on Web Spam Detection Methods: Taxonomy


226 Shekoofeh Ghiam and Alireza Nemaney Pour, Sharif University of Technology, Iran 09
and Islamic Azad University of Abhar, Iran

Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network


227 Amol Vasudeva and Manu Sood, Jaypee University of Information Technology, India 18
and Himachal Pradesh University, India

A Simple and Reliable Touch Sensitive Security System


228 Adamu Murtala Zungeru, Jonathan Gana Kolo and Ijarotimi Olumide, University 11
of Nottingham, Malaysia and Rufus Giwa Polytechnic, Nigeria

Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer


Network
229 0
Prashant Kumar Singh, A. K. Vatsa, Reetu Sharma and Priyanka Tyagi, Shobhit
University, India, CERT, India and DVSIET, India
Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM
System with Implementation of Concatenated ECB and CFB Cryptographic Algorithm
230 0
Laila Naznin,Shahrina Sultana, M. Golam Rashed and Shaikh Enayet Ullah, University
of Rajshahi, Bangladesh

Explore Ten Different Types of Software Engineering Principles


231 S.Thulasee Krishna, S.Sreekanth, B. Bhaskar and N.Pavan Kumar, Kuppam 03
Engineering College, India and Sitams, Chittoo(DT), India

Volume 4, Number 6, November 2012

RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
232 07
Merad Boudia Omar Rafik and Feham Mohamed, University of Tlemcen, Algeria

Secured RFID Mutual Authentication Scheme for Mifare Systems


233 02
Kuo-Tsang Huang and Jung-Hui Chiu, Chang Gung University, Taiwan

Malware Detection, Supportive Software Agents and Its Classification Schemes


Adebayo, Olawale Surajudeen, M.A. Mabayoje, Amit Mishra and Osho
234 11
Oluwafemi, Federal University of Technology, Nigeria, University of Ilorin, Nigeria
and IBB University Lapai, Nigeria

Mining Techniques in Network Security to Enhance Intrusion Detection Systems


235 06
Maher Salem and Ulrich Buehler, University of Applied Sciences, Germany

A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel


Abudhahir Buhari, Zuriati Ahmad Zukarnain, Shamala K. Subramaniam , Hisham
236 02
Zainuddin1 and Suhairi Saharudin, University Putra Malaysia, Malaysia
and MIMOS - Technology Park Malaysia, Malaysia

Modelling and Verification of Extensible Authentication Protocol Using Spin Model


237 Checker 03
Manu S. Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India

The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS


238 John Tengviel, K. Diawuo and K. A. Dotche, Sunyani Polytechnic, Ghana 0
and KNUST Kumasi, Ghana

Wireless Public Key Infrastructure for Mobile Phones


239 Balachandra Muniyal, Krishna Prakash and Shashank Sharma, Manipal University, 04
India

Secure Key Management Protocol in WIMAX


240 Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade, Badji Mokhtar 04
University, Algeria and Joseph Fourier University, France

A Novel Multipoint Relay based Secure Routing in MANET


241 01
Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee, IEM KolaKata, India

Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining


Technique
242 02
Oluwafemi Oriola, Adesesan B. Adeyemo and Oluwaseyitanfunmi Osunade, University
of Ibadan, Nigeria
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography
243 01
Arpita Sarkar and Sachin Tripathi, Indian School of Mines Dhanbad, India

Review on IPv6 Security Vulnerability Issues and Mitigation Methods


Supriyanto, Raja Kumar Murugesan and Sureswaran Ramadass, Universitas Sultan
244 07
Ageng Tirtayasa, Indonesia, Taylor's University, Malaysia and National Advanced
IPv6 Centre (NAv6) Universiti Sains, Malaysia

Volume 5, Number 1, January 2013

Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case
255 Study 0
Natarajan Meghanathan, Jackson State University, USA

A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
256 Kuo-Tsang Huang, Jung-Hui Chiu and Sung-Shiou Shen, Chang Gung University, 08
Taiwan and DE LIN Institute of Technology, Taiwan

An Integrated Solution for both Monitoring and Controlling for Automization Using
Wireless Sensor Networks: A Case Study
257 0
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing -
Hyderabad, India

How to Find a Fixed Point in Shuffle Efficiently


258 0
Mikako Kageshima and Manabu Okamoto, Kanagawa Institute of Technology, Japan

Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study


259 Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University 09
Technology Malaysia (UTM), Malaysia

Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and
Support Vector Machines
260 12
A. M. Chandrashekhar and K. Raghuveer, Sri Jayachamarajendra College of
Engineering (SJCE), India and National Institute of Engineering (NIE) Mysore, India

Text Steganographic Approaches: A Comparison


261 40
Monika Agarwal, PDPM-IIITDM Jabalpur, India

Volume 5, Number 2, March 2013

Incident Response Plan for a Small to Medium Sized Hospital


262 0
Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA

Privacy Preserving Data Mining by using Implicit Function Theorem


263 Pasupuleti Rajesh and Gugulothu Narsimha, VVIT College, India and JNTUH 02
University, India.

Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering


Systems
264 0
Alexis V. Pantola, Susan Pancho-Festin and Florante Salvador, De La Salle
University, Philippines and University of the Philippines, Philippines
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks
Leelavathi G, Shaila K, Venugopal K R and L M Patnaik, Govt.S.K.S.J.
265 Technological Institute, India, Vivekananda Institute of Technology, India, 03
University Visvesvaraya College of Engineering, India and Indian Institute of
Science, India

Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the 0
267
West Indies, Trinidad and Tobago.

A 64 Bits Rotor Enhanced Block Cipher (Rebc3)


268 0
Ahmed ElShafee, Ahram Canadian University, Egypt.

A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering


269 S.Lakshmi and V.Sankaranarayanan, Jeppiaar Engineering College, India 01
and Crescent Engineering College, India.

Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and
Wireless Environment
270 02
Shalvi Dave, Bhushan Trivedi and Jimit Mahadevia, Indus University,
India, GLSICT,India and Elitecore Technologies Pvt. Ltd., India

Code Aware Dynamic Source Routing for Distributed Sensor Network

271 M Abdul Rahiman, Nishanth Jain, Arun K. Dubey and G Manoj Kumar, AICTE, 01
Ministry of HRD,Govt of India, India, Bharati Vidyapeeth College of Engineering,
India and LBS Inst of Tech for Women, India.

Resonance Based Micromechanical Cantilever for Gas Sensing


272 Subhashini. S and Vimala Juliet. A, Sathyabama University, India and SRM 0
University, India

Traceback of DOS Over Autonomous Systems


273 Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic 04
Engineering, University of Essex, UK

Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-


hoc Network Environment
274 25
Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University,
India

A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries


275 Dexin Yang, Chunjing Lin and Bo Yang, Guangzhou City Polytechnic, China 01
and Shaanxi Normal University, China

Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on
Deviant System Behaviour
276 0
Arpitha M1, Geetha V,Gowranga K H and Bhakthavathsalam R, Alpha College Of
Engineering, India and Indian Institute of Science, India

E-Commerce Systems Security for Small Businesses


278 04
Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA.
Volume 5, Number 3, May 2013

Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy
Depletion Parameters
279 0
S.Prabhakara Rao, E.Nagabhooshanam and S.Ramesh Babu, Nigama Engineering
College, India and Sridevi Womens Engineering College, India

An Efficient Group Authentication for Group Communications


280 Lein Harn and Changlu Lin, University of Missouri, USA and Fujian Normal 06
University, P. R. China

Password Based Scheme and Group Testing for Defending DDOS Attacks
281 G Dayanandam, T V Rao, S Pavan Kumar Reddy and Ravinuthala Sruthi, QIS 03
Institute of Technology (QISIT), India and KL University (KLU), India

Security Algorithms for WIMAX


282 M Alzaabi, K D Ranjeeth, T Alukaidey and K Salman, University of Hertfordshire, 02
UK and Middle Tennessee State University, USA

Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network


283 04
Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran

HTTPI Based Web Service Security over SOAP


284 Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of 05
Information Technology & Management, India

Implementation of a Security Protocol for Bluetooth and WI-FI


285 03
U. Pavan Kumar, Amity University, India

Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector
Machine
286 11
Fatima Ezzahra Sloukia, Rajae Bouarfa, Hicham Medromi and Mohammed
Wahbi, SIR2C2S/LASI-EHTP, Morocco and Hassan II University, Morocco

Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc
Networks
287 02
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of
Information Technology, India

Volume 5, Number 4, July 2013

Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level
288 Fahmida Rahman and Mohammed Arozullah, The Catholic University of America, 0
USA

Phishing Techniques and Mitigating the Associated Security Risks


289
Marc A. Rader and Syed (Shawon) M. Rahman, Capella University, USA

Wireless Networks Security in Jordan: A Field Study


290 Ahmad S. Mashhour and Zakaria Saleh, University of Bahrain, Bahrain 02
and Yarmouk University, Jordan
Early Detection of SQL Injection Attacks
291 06
Hossain Shahriar, Sarah North and Wei-Chuen Chen, Kennesaw State University, USA

A Framework for Security Components Anomalies Severity Evaluation and Classification


292 Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba, 0
Tunisia

Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication
293 Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad, 03
Prasad V. Potluri Siddhartha Institute of Technology, India

Defence Schemes From Attacker's Own Reward Processes


294 01
L-F Pau, Copenhagen Business School, Denmark

Controlling IP Falsifying Using Realistic Simulation


295 Govindavaram Madhusri and Chakunta Venkata Guru Rao, Kakatiya University, 0
India and JNTU University, India

Malware Risk Analysis on the Campus Network with Bayesian Belief Network
296 Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad 1
NadzirMarsono, Universiti Teknologi Malaysia, Malaysia

Internal Security on an IDS Based on Agents


297 Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana, 02
Colombia

A New Stemmer to Improve Information Retrieval


298 16
Wahiba Ben Abdessalem Karaa, University of Tunis. Tunisia

Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm


299 0
Kartit Ali, University Mohammed V-Agdal, Morocco

Steganography and Random Grids


300 Pratarshi Saha, Sandeep Gurung and Kunal Krishanu Ghose, Sikkim Manipal 0
Institute of Technology, India and QualComm, USA

An Improved MULTI-SOM Algorithm


301 Imen Khanchouch, Khaddouja Boujenfa and Mohamed Limam, University of Tunis, 02
Tunisia and Dhofar University, Oman

Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in
302 Vanet Scenario 01
Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India

Volume 5, Number 5, September 2013

Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords?


303 02
ManabuOkamoto, Kanagawa Institute of Technology, Japan

A Security Framework in Cloud Computing Infrastructure


304 Arijit Ukil, Debasish Jana and Ajanta De Sarkar, Tata Consultancy Services, India 13
and Birla Institute of Technology, India
Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC)
305 0
Ahmed ElShafee, Ahram Canadian University, Egypt

Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT
306 0
Madhumita Sengupta and J. K. Mandal, University of Kalyani, India

Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing


307 06
Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam

Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric


Recognition System
308 07
Binsu C. Kovoor, Supriya M.H. and K. Poulose Jacob, Cochin University of Science
and Technology, India

Secure Collaborative Processing Architecture for MITB Attack Detection


309 02
Hani Qusa and Shadi Abudalfa, University College of Applied Science, Palestine

Security Challenges, Issues and Their Solutions For Vanet


Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of
310 59
Advanced communication Technologies & Research, India

Defense Mechanisms for Computer-Based Information Systems


311 02
Majid Alshammari and Christian Bach, University of Bridgeport, USA

Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO
312 02
K.Kuppusamy and K.Thamodaran, Alagappa University, India

Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in
313 A Cloud Computing Environment 05
N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India

Z-Shaped Dipole Antenna and its Fractal Iterations


314 04
Mustafa H. Abu Nasr, Al- Azhar University, Palestine

A Novel Approach for Secure Routing Through BGP Using Symmetric Key
315 01
Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India

Evaluating the Performance of the Secure Block Permutation Image Steganography


Algorithm
316 0
Adnan M. Shihab, Raghad K. Mohammed and Woud M. Abed, University of Baghdad,
Iraq

A Novel Technique to Detect Intrusion in Manet


317 J. K. Mandal and Khondekar Lutful Hassan, University of Kalyani, India 03
and University of Calcutta,India

Volume 5, Number 6, November 2013

Complete Network Security Protection for SME's within Limited Resources


318 Margie S. Todd and Syed (Shawon) M. Rahman,, Capella University, USA 01
and University of Hawaii-Hilo, USA
Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge
Bases
319 02
Gaurav Kumar Tak and Gaurav Ojha, Lovely Professional University, India
and Indian Institute of Information Technology and Management, India

A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile


320 Banking 01
Bossi Masamila, Dublin Institute of Technology, Ireland

Securing Mobile Cloud Using Finger Print Authentication


321 12
IehabALRassan and HananAlShaher, King Saud University, Saudi Arabia

Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine


322 Anjan K, Srinath N K and Jibi Abraham, R V College of Engineering, India 01
and College of Engineering, India

Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel


Shortening in Multi-carrier Systems
323 Samir Abd Elghafar,, Salaheldin M. Diab, Bassiouny M. Sallam, Moawad I. 0
Dessouky, El-Sayed M. El-Rabaie and Fathi E. Abd El-Samie, Menoufia University,
Egypt and Jazan University, Saudi Arabia

Investigating the Effects of the Common Control Channel Challenge in Multichannel


Cognitive Networks With Hypothetical Spectrum Hole
324 0
Mthulisi Velempini and Mqhele E. Dlodlo, North-West University, South Africa
and University of Cape Town, South Africa

Volume 6, Number 1, January 2014

Optimised Malware Detection in Digital Forensics


325 SaeedAlmarri and Paul Sant, University of Bedfordshire, United Kingdom 05
and University Campus Milton Keynes, United Kingdom

A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach

326 Shadi R. Masadeh, Ahmad Azzazi, Bassam A. Y. Alqaralleh and Ali, Mousa.Al 01
Sbou, Isra University, Jordan, Applied Science University, Jordan and Al-Hussein
Bin Talal University, Jordan

Cloud Computing and Security Issues in the Cloud


327 Monjur Ahmed and Mohammad Ashraf Hossain, Daffodil Institute of IT, 61
Bangladesh and Freelance IT Consultant, Bangladesh

A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service


Oriented Architecture
328 02
Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University,
Mashhad, Iran

SPARQL: Semantic Information Retrieval by Embedding Prepositions


329 Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University, 01
India
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for
330 Electronic Commerce Transactions and Payments 0
Fahad A Alqahtani, De Montfort University, United Kingdom

An IAC Approach for Detecting Profile Cloning in Online Social Networks


331 MortezaYousefi Kharaji and FatemehSalehi Rizi, Mazandaran University of Science 04
and Technology, Iran and Sheikhbahaee University of Isfahan, Iran

Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares


332 Pallavi Vijay Chavan, Mohammad Atique and Latesh Malik, GHRCE - Nagpur, 09
India and SGBAU -Amravati, India

Volume 6, Number 2, March 2014

The Impact of Management Information systems(MIS) Technologies on the quality of


333 Services provided at the University of TABUK 03
Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan

Enhancing the Impregnability of Linux Servers


334 Rama Koteswara Rao G, Satya Prasad R, Pathanjali Sastri A and P.E.S.N. 0
Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India and Acharya
Nagarjuna University, India

Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To


Exploit Diversity
335 02
Swati Chowdhuri, Santanu Maiti, Sheli Sinha Chaudhuriand and P.K.Baneerjee,
Seacom Engineering College, India and Jadavpur University, India

A New Hybrid Algorithm for Business Intelligence Recommender System


336 P.Prabhu and N.Anbazhagan, Alagappa University, India 0

Volume 6, Number 3, May 2014

Privacy Protection for Role-Based Access Control in Service Oriented Architecture


337 01
Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada

Survey of Manet Misbehaviour Detection Approaches


338 08
Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India

Attack Graph-Based Risk Assessment and Optimisation Approach


339 05
Mohammed Alhomidi and Martin Reed, University of Essex, UK

Security Issues Associated with Big Data in Cloud Computing


340 Venkata Narasimha Inukollu , Sailaja Arsi and Srinivasa Rao Ravuri, Texas Tech 50
University, USA and Cognizant Technology Solutions, India

A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations


341 17
FuiFui Wong and Cheng Xiang Tan, TongJi University, China
Role of Integrated Virtual E-Learning System for Distance Learning Students
342 Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology 0
for Women, India

Self-Protection Mechanism For Wireless Sensor Networks


343 04
Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran

Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
344 01
Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India

Volume 6, Number 4, July 2014

End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc
345 Networks. 01
Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA

Analysis of RSA Algorithm using GPU Programming


346 10
Sonam Mahajan and Maninder Singh, Thapar University, India

Evaluation of Enhanced Security Solutions in 802.11-Based Networks


347 01
Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria

Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various


File Features
348 23
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering
Pune, India

State of Mobile Banking in Tanzania and Security Issues


349 09
Bossi Masamila, Dublin Institute of Technology, Ireland

A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images

350 El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University 03
of Khartoum, Sudan

Volume 6, Number 5, September 2014

A Secure Electronic Payment Protocol for Wireless Mesh Networks


351 01
Helen Cheung and Cungang Yang, Ryerson University, Canada

Cloud Based Access Control Model for Selective Encryption of Documents with Traitor
352 Detection 02
Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India

Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert
Aggregation
353 0
Peter Mell and Richard Harang, National Institute of Standards and Technology,
USA and U.S. Army Research Laboratory, USA

A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports


354 0
Hamsha and Nagaraj, RVCE Bangalore, India
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
355 01
Waqas Aman, Gjovik University College, Norway

Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review

356 Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere 06


UniversityKampala, Uganda

Volume 6, Number 6, November 2014

A Cryptographic Mutual Authentication Scheme for Web Applications


357 04
Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco

Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure
Division
358 02
Sumana M and Hareesha K S, M S Ramaiah Institute of Technology, India
and Manipal Institute of Technology, India

Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information


359 Systems) 0
Hani Qusa, University College of Applied Science, Palestine

Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts


360 0
Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India

Key Management Techniques in Wireless Sensor Networks


361 Khawla Naji Shnaikat and Ayman Ahmed Qudah, University of Jordan, Jordan 03
and University of Dammam, KSA

Volume 7, Number 1, January 2015

Multi-Facet Trust Model for Online Social Network Environment


Liu Ban Chieng, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba and Rohail
362 02
Hassan, University Sains Malaysia, Malaysia and Universiti Teknologi Petronas,
Malaysia

Accessing Secured Data in Cloud Computing Environment


363 06
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia

Service Oriented Configuration Management of Software Architecture


364 Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, 0
Iran

Runtime Potential Updater File(S) Identification: Does Your Software Updates


Automatically With Application Whitelisting?
365 0
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of
Advanced Computing, India

Strong Zero-Knowledge Authentication Based on the Session Keys (SASK)


366 Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire 04
des Systemes informatiques et Vision (LabSiV), Morocco
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS
367 05
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and
Technology, India

A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation

368 Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura 01
Udzir, Universiti Putra Malaysia, Malaysia

Volume 7, Number 2, March 2015

Exploiting Rhetorical Relations to Multiple Documents Text Summarization


369 N.Adilah Hanin Zahri, Fumiyo Fukumoto, Matsyoshi Suguru and Ong Bi 0
Lynn, University of Malaysia Perlis, Malaysia and University of Yamanashi, Japan

An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols


370 Mabroka Maeref, Fatma Algali, Ahmed Patel and Zarina Shukur, Sebha University 01
Libya and The National University of Malaysia, Malaysia

A New Image Steganography Algorithm Based on MLSB Method with Random Pixels
371 Selection 03
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan

Certificate Less Key Management Scheme in Manet Using Threshold Cryptography


372 Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, 01
India

Comprehensive Survey of Possible Security Issues on 4G Networks


373 Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of 06
Technology, India

Volume 7, Number 3, May 2015

Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security
Solutions
374 Nabeel Zanoon, Nashat Albdour, Hatem S. A. Hamatta and Rasha Moh'd Al- 04
Tarawneh, Al-Balqa Applied University, Jordan and Tafila Technical University,
Jordan

An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection
375 02
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India

A Performance Evaluation Of Common Encryption Techniques With Secure Watermark


System (SWS)
376 01
Ashraf Odeh, Shadi R.Masadeh and Ahmad Azzazi, Isra University, Jordan
and Applied Science University, Jordan

Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured
Communication
377 0
Anjan K1, Srinath N K and Jibi Abraham, R V College of Engineering, India
and College of Engineering Pune, India
Volume 7, Number 4, July 2015

Deterring Hacking Strategies via Targeting Scanning Properties


378 Saad Alsunbul,, Phu Dung Le, Jefferson Tan, Monash University, Australia 0
and King Abdullaziz for Science and Technology, Saudi Arabia

Providing End-To-End Secure Communications in GSM Networks


379 Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime 38
Transport, Egypt

Volume 7, Number 5, September 2015

ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications


380 Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for 0
Development of Advanced Computing, India

Improved Steganographic Security by Applying an Irregular Image Segmentation and


Hybrid Adaptive Neural Networks with Modified Ant Colony Optimization
381 0
Nameer N. El. Emam and Kefaya S. Qaddoum, Philadelphia University, Jordan
and Warwick University, UK

An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing


382 P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco 0
Institute of Technology, India

Volume 7, Number 6, November 2015

A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for


Intrusion Detection in Computer Network
383 0
Yuchen Wang, Shuxiang Xu and Qiongfang Huang, Zhejiang University of
Technology, China and University of Tasmania, Australia

A Machine Learning Approach to Anomaly-Based Detection on Android Platforms


384 Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal 04
University of Technology Minna, Nigeria

A System for Validating and Comparing Host-Based Ddos Detection Mechanisms


385 Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam 0

Volume 8, Number 1, January 2016

Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper-


Compact Estimators
386 0
You Zhou, Yian Zhou, Shigang Chen and O. Patrick Kreidl, University of Florida,
USA and University of North Florida, USA

Employee Trust Based Industrial Device Deployment and Initial Key Establishment
Apala Ray, and Johan Akerberg,and Mats Bjorkman and Mikael Gidlund, ABB
387 Corporate Research- Bangalore, India, Malardalen University, Sweden, ABB 03
Corporate Research-Vasteras, Sweden and Mid Sweden University, Sundsvall,
Sweden
A Security Strategy against STEAL-AND-PASS Credential Attacks
388 0
Juan Ceballos, Security Consulting & Engineering, T-Systems International, Germany

Big Data Security and Privacy Issues in the CLOUD


389 01
Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden

Volume 8, Number 2, March 2016

Trends Toward Real-Time Network Data Steganography


390 01
James Collins, Sos Agaian, The University of Texas at San Antonio, USA

Intrusion Detection System Using Discrete Fourier Transform with Window Function
391 0
Yusuke Tsuge and HidemaTanaka, National Defense Academy of Japan, Japan

A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks


392 Inna Kofman and Nurul Huda, University of Duesseldorf, Germany and Ryerson 0
University, Canada

A Security Evaluation Framework for U.K. E-Government Services Agile Software


Development
393 Steve Harrison,Antonis Tzounis, Leandros Maglaras, Francois Siewe, Richard 01
Smith and Helge Janicke, De Montfort University, United Kingdom and University
of Thessaly, Greece

Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation
D.Sravana Kumar, P.Sirisha and CH. Suneetha, Dr. V.S. Krishna Government
394 0
Degree College, India, Indian Maritime University, India and GITAM University,
India

The Internet of Things : New Interoperability, Management and Security Challenges


395 Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, 06
Australia

Design and Implementation of the Advanced Cloud Privacy Threat Modeling


Ali Gholami, Anna-Sara Lind, Jane Reichel, Jan-Eric Litton, Ake Edlund, Erwin
396 04
Laure, KTH Royal Institute of Technology, Sweden, Uppsala University, Sweden
and Karolinska Institutet, Sweden

Volume 8, Number 3, May 2016

Using a Deep Understanding of Network Activities for Security Event Management


397 Mona Lange, Felix Kuhr and Ralf Moller, Universitat zu Lubeck, Germany 0
and Technical Universitat Hamburg-Harburg, Germany

Wearable Technology Devices Security and Privacy Vulnerability Analysis


398 Ke Wan Ching and Manmeet Mahinderjit Singh, University Sains Malaysia Penang, 0
Malaysia

Y-Hamiltonian Layers Broadcast Algorithm


399 01
Amnah El-Obaid and Nagham_Al-Madi, Zaytoonah University of Jordan, Jordan
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using
Q-Learning
400 0
S.Sivagurunathan, K.Prathapchandran and A.Thirumavalavan, Gandhigram Rural
Institute-Deemed University, India and Arignar Anna Government Arts College, India

Volume 8, Number 4, July 2016

Proactive Detection of DDOS Attacks in Publish-Subscribe Networks


Bander Alzahrani, Vassilios Vassilakis, Mohammed Alreshoodi, Fawaz Alarfaj and
401 Ahmed Alhindi, King Abdulaziz University, Saudi Arabia, University of Brighton, 01
United Kingdom, Qassim University, Saudi Arabia, Al Imam Mohammad Ibn Saud
Islamic University (IMSIU), Saudi Arabia and Umm Al-Qura University, Saudi
Arabia

Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle
402 Swarm Optimization 0
Mohammed Awad and Monir Foqaha, Arab American University, Palestine

Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs


403 Ali Abu Romman and Hussein Al-Bahadili, Princess Sumaya University for 0
Technology, Jordan and University of Petra, Jordan

A Benchmark for Designing Usable and Secure Text-Based Captchas


404 03
Suliman A. Alsuhibany, Qassim University, Saudi Arabia

An Intelligent Classification Model for Phishing Email Detection


405 Adwan Yasin and Abdelmunem Abuhasan, Arab American University, Palestine 0

Volume 8, Number 5, September 2016

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS


Attacks
406 0
Chin-Ling Chen and Hsin-Chiao Chen, National Pingtung University, Taiwan
and National Pingtung Institute of Commerce, Taiwan

Enhance RFID Security Against Brute Force Attack Based on Password Strength and
407 Markov Model 0
Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine

Color Image Encryption Based on Multiple Chaotic Systems


408 Adwan Yasin and Fadi AbuAlrub, Arab American University, Palestine 0
Yuting Xi, Xing Zhang and Ruisong Ye, Shantou University, P. R. China

Volume 8, Number 6, November 2016

Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique


409 Jawaher alqahtani, Daniyal Alghazzawi and Li Cheng, King Abdulaziz University, 0
Saudi Arabia and Chinese Academy of Sciences, China
A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue
410 0
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam

A Bastion Mobile ID-Based Authentication Technique (BMBAT)


411 0
Abdelmunem Abuhasan and Adwan Yasin, Arab American University, Palestine

Volume 9, Number 1, January 2017

A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster
Notification System
412 0
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam
University, Korea

Application-Layer DDOS Detection Based on a One-Class Support Vector Machine

413 Chuyu She, , , Wushao Wen,, Zaihua Lin and Kesong Zheng, Sun Yat-Sen 0
University, China, SYSU-CMU Shunde International Joint Research Institute, China
and Guangdong University of Finance & Economics, China

A Survey on Security in Wireless Sensor Networks


414 06
Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia

Volume 9, Number 2, March 2017

Metric for Evaluating Availability of an Information System : A Quantitative Approach


Based on Component Dependency
415 Suhail Qadir Mir1 and S.M.K. Quadri2, 1 University of Kashmir, India and 2Jamia 0
Millia Islamia, India

A Secure E-Medical Exemption System (E-MES): Jordan Case

416 Heba N. Kamel, Mohammad A. Alia, Bara'aha. Al Saeq and Eman Abu Maria, Al 0
Zaytoonah University of Jordan, Jordan

Volume 9, Number 3, May 2017

A Conceptual Secure Blockchain Based Electronic Voting System


417 0
Ahmed Ben Ayed, Colorado Technical University, USA

Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques
418 Mehrdad Nourai and Haim Levkowitz, University of Massachusetts Lowell, USA 0
Projected citation counts in 2020 for International Journal of Network
Security & Its Applications (IJNSA)

Calendar (A): # Papers (B): Total (C): Median (D): (E):


Year published per # citations # of citations Average # Projected
year (as of Oct. per paper citations total #
2016) per paper citations
per year in 2020
2009 24 478 9 2.5 717
2010 53 647 7 1.7 1012
2011 90 1063 5.5 2 1770

2012 77 724 3 1.9 1305

2013 80 305 2 1 608

2014 37 545 2 5 1274

2015 24 74 1 1.5 222

2016 26 21 0 0.8 105

You might also like