Abstract is missing.
- The UID Project: Lessons Learned from the West and Challenges Identified for IndiaRajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao. 1-23 [doi]
- Combined Impact of Outsourcing and Hard Times on BPO Risk and SecurityC. Warren Axelrod, Sukumar Haldar. 24-32 [doi]
- A Comparison of Cyber-Crime Definitions in India and the United StatesHimanshu Maheshwari, H. S. Hyman, Manish Agrawal. 33-45 [doi]
- Emergency Response to Mumbai Terror Attacks: An Activity Theory AnalysisDivya Shankar, Manish Agrawal, H. Raghav Rao. 46-58 [doi]
- Pirates of the Copyright and Cyberspace: Issues InvolvedCharulata Chaudhary, Ishupal Singh Kang. 59-68 [doi]
- Classifying Host Anomalies: Using Ontology in Information Security MonitoringSuja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma. 70-86 [doi]
- Securing Next Generation Internet ServicesAsoke K. Talukder. 87-105 [doi]
- An Examination of Identity Management Models in an Internet SettingKenneth J. Giuliani, V. Kumar Murty. 106-114 [doi]
- Securing Cloud EnvironmentN. Harini, C. K. Shyamala, T. R. Padmanabhan. 115-123 [doi]
- DoS Attacks in MANETs: Detection and CountermeasuresRajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi. 124-145 [doi]
- Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor NetworksMohit Virendra, Qi Duan, Shambhu J. Upadhyaya. 146-167 [doi]
- Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network TrafficS. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli. 168-177 [doi]
- Metamorphic Malware Analysis and Detection MethodsP. Vinod, Vijay Laxmi, Manoj Singh Gaur. 178-202 [doi]
- Towards Checking Tampering of SoftwareN. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar. 204-219 [doi]
- Complexity Measures of Cryptographically Secure Boolean FunctionsChungath Srinivasan, K. V. Lakshmy, M. Sethumadhavan. 220-230 [doi]
- Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some ApplicationsNarayanankutty Karuppath, P. Achuthan. 231-239 [doi]
- Error Linear Complexity Measures of Binary MultisequencesM. Sindhu, S. Kumar Sajan, M. Sethumadhavan. 240-249 [doi]
- A Survey on Digital Image Steganographic MethodsP. P. Amritha, T. Gireesh Kumar. 250-258 [doi]