Abstract is missing.
- Intelligent Network-Based Intrusion Detection System (iNIDS)P. R. Mahalingam. 1-9 [doi]
- Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known PasswordTumpa Roy, Poonam Sisodia, Divye Upadhyay, Kamlesh Dutta. 11-22 [doi]
- Securing Multi-agent Systems: A SurveyS. V. Nagaraj. 23-30 [doi]
- Personal Secret Information Based Authentication towards Preventing Phishing AttacksGaurav Varshney, Ramesh Chandra Joshi, Anjali Sardana. 31-42 [doi]
- Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and AnalysisPremraj Mahajan, Anjali Sardana. 43-53 [doi]
- An Integrated Intrusion Detection System for Credit Card Fraud DetectionM. Sasirekha, I. Sumaiya Thaseen, J. Saira Banu. 55-60 [doi]
- Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection SystemsMajid Nezakatolhoseini, Sam Jabbehdari, Mohammad Ali Pourmina. 61-70 [doi]
- ECDLP Based Proxy Multi-signature SchemeRamanuj Chouksey, R. Sivashankari, Piyush Singhai. 71-79 [doi]
- SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its IssuesD. Chandramohan, D. Veeraiah, M. Shanmugam, N. Balaji, G. Sambasivam, Shailesh Khapre. 81-86 [doi]
- Host-Based Bot Detection Using Destination White-Lists for User's ProfileB. Soniya, M. Wilscy. 87-93 [doi]
- Effective Implementation and Evaluation of AES in MatlabAmish Kumar, Namita Tiwari. 95-101 [doi]
- Low Overhead Handoff Based Secure Checkpointing for Mobile HostsPriyanka Dey, Suparna Biswas. 103-112 [doi]
- An Obfuscated Implementation of RC4Roger Zahno, Amr M. Youssef. 113-129 [doi]
- A Statistical Pattern Mining Approach for Identifying Wireless Network IntrudersNur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha. 131-140 [doi]
- SLA for a Pervasive Healthcare EnvironmentJ. Valarmathi, K. Lakshmi, R. S. Menaga, K. V. Abirami, V. Rhymend Uthariaraj. 141-149 [doi]
- Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline EnvironmentMayank Kumar Goyal, Alok Aggarwal. 151-157 [doi]
- SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTNSujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra, Subrata Nandi. 159-169 [doi]
- Multi Tree View of Complex Attack - StuxnetShivani Mishra, Krishna Kant, R. S. Yadav. 171-188 [doi]
- Secure Peer-Link Establishment in Wireless Mesh NetworksSwathi Bhumireddy, Somanath Tripathy, Rakesh Matam. 189-198 [doi]
- Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT)Uttam Kr. Mondal, Jyotsna Kumar Mandal. 199-208 [doi]
- Specification Based IDS for Power Enhancement Related Vulnerabilities in AODVChaitali Biswas Dutta, Utpal Biswas. 209-218 [doi]
- English to Hindi Machine Translator Using GMT and RBMT ApproachAmbrish Srivastav, Nitin Hambir. 219-225 [doi]
- Plugging DHCP Security Holes Using S-DHCPAmit Kumar Srivastava, Arun Kumar Misra. 227-238 [doi]
- Efficient Cryptography Technique on Perturbed Data in Distributed EnvironmentNishant Goswami, Tarulata Chauhan, Nishant Doshi. 239-244 [doi]
- A Novel Triangle Centroid Authentication Protocol for Cloud EnvironmentK. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna, S. Rubika. 245-254 [doi]
- Security and Availability of Data in the CloudAhtesham Akhtar Patel, S. Jaya Nirmala, S. Mary Saira Bhanu. 255-261 [doi]
- A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor NetworksShanta Mandal, Rituparna Chaki. 263-271 [doi]
- A Cryptographic Approach towards Black Hole Attack DetectionPratima Sarkar, Rituparna Chaki. 273-278 [doi]
- Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing ChannelsBukke Devendra Naik, Sarath Chandra Boddukolu, Pothula Sujatha, P. Dhavachelvan. 279-288 [doi]
- Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc NetworksJagadeesh Kakarla, S. Siva Sathya. 289-298 [doi]
- Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission LinksMayank Kumar Goyal, Yatendra Kumar Verma, Paras Bassi, Paurush Kumar Misra. 299-306 [doi]
- Personalised High Quality Search with in a Web Site: No User ProfilingL. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai. 307-316 [doi]
- Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection SystemTulsidas Patil, Ganesh Dattatray Bhutkar, Noshir Tarapore. 317-328 [doi]
- Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode ControlSundarapandian Vaidyanathan. 329-337 [doi]
- String Matching Technique Based on Hardware: A Comparative AnalysisAakanksha Pandey, Nilay Khare. 339-347 [doi]
- Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor NetworksR. Shyamala, S. Valli. 349-359 [doi]
- Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular NetworkChandra Thapa, C. Chandrasekhar. 361-367 [doi]
- Temporary Parallel Route Recovery for Frequent Link Failure in VANETB. Siva Kumar Reddy, M. Sakthi Ganesh, P. Venkata Krishna. 369-374 [doi]
- Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing SimulatorManjusha Karkhanis, Achala Deshmukh. 375-383 [doi]
- Efficient Target Recovery in Wireless Sensor NetworkShailaja Patil, Ashish Gupta, Mukesh Zaveri. 385-394 [doi]
- Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart SystemSoma Bandyopadhyay, Abhijan Bhattacharyya. 395-404 [doi]
- Improving TCP Performance in Hybrid NetworksO. S. GnanaPrakasi, P. Varalakshmi. 405-415 [doi]
- Synchronization in Distributed SystemsAmritha Sampath, C. Tripti. 417-424 [doi]
- NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction ComponentDebajyoti Mukhopadhyay, Sheetal Vij, Suyog Tasare. 425-434 [doi]
- Quantum DOT Sensor for Image Capturing and Routing Based on Temporal Power and Critical FactorS. Indu Vadhani, G. Vithya, B. Vinayagasundaram. 435-445 [doi]
- Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc NetworkSuparna Biswas, Sarmistha Neogy. 447-456 [doi]
- Design of Broadband Optical Sources for OCDMA/WDMA ApplicationsLakshmi Priya, M. Meenakshi, G. Geetha. 457-466 [doi]
- Localization in Wireless Sensor Network: A Distributed ApproachShailaja Patil, Mukesh Zaveri. 467-476 [doi]
- Web Mining and Security in E-commerceShaikh Mohammed Atiq, Dayanand Ingle, B. B. Meshram. 477-487 [doi]
- Performance Improvement in MIMO Systems Using Rotating CodebooksJ. Julia, M. Meenakshi. 489-496 [doi]
- Efficient Techniques for the Implementation of AES SubByte and MixColumn TransformationsK. Rahimunnisa, M. Priya Zach, S. Suresh Kumar, J. Jayakumar. 497-506 [doi]
- Feature Selection for Detection of Ad Hoc Flooding AttacksSevil Sen, Zeynep Dogmus. 507-513 [doi]
- Performance Analysis of SCTP Compared to TCP and UDPNagesha, S. S. Manvi. 515-524 [doi]
- MSRCC - Mitigation of Security Risks in Cloud ComputingD. Chandramohan, T. Vengattaraman, M. S. Saleem Basha, P. Dhavachelvan. 525-532 [doi]
- Topology Construction of 3D Wireless Sensor NetworkSarbani Roy, Nandini Mukherjee. 533-542 [doi]
- Design and Analysis of Dual Capacitively Loaded C-PIFAKirti Dhwaj, Rachit Garg, Gaurav Mishra, Neetesh Purohit. 543-550 [doi]
- Jong Nang 3-Input NOR Channel, Moon Ho Lee, Md. Hashem Ali Khan, Daechul Park. 551-562 [doi]
- Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective ChannelsNithin Srinivasan, Sriram Ravichandran, Shruthi Ravichandran, Prabagarane Nagaradjane. 563-573 [doi]
- Multi-dimensional Performance Characterization of Directional Antennas for Applications in Energy Efficient Ad-Hoc NetworkC. H. Sandhya, Deepali R. Borade, Rinki Sharma, Govind R. Kadambi. 575-585 [doi]
- Reliability Enhanced Routing Protocol for Wireless Mesh NetworksRakesh Matam, Somanath Tripathy. 587-596 [doi]
- DARIH: Distributed Adaptive Routing via Information Highway in Sensor NetworkMonomita Mazumdar, Srimanta Halder, Prasenjit Chanak, Indrajit Banerjee. 597-607 [doi]
- A Comparative Study of Cache Replacement Policies in Wireless Mobile NetworksPreetha Theresa Joy, K. Polouse Jacob. 609-619 [doi]
- FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor NetworkSrimanta Halder, Monomita Mazumdar, Prasenjit Chanak, Indrajit Banerjee. 621-631 [doi]
- Effective Resource Allocation Technique for Wireless Cellular SystemBanda Sreenivas, S. Ramesh Babu, S. Prabhakar, D. Karunakar Reddy. 633-640 [doi]
- Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile RobotsRajesh P. Barnwal, Arnab Thakur. 641-649 [doi]
- Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing AttackPayal Chaudhari, Hiteishi Diwanji. 651-660 [doi]
- Super Peer Deployment in Unstructured Peer-to-Peer NetworksR. Venkadeshan, M. Jegatha. 661-669 [doi]
- Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in WSNSubrata Dutta, Nandini Mukherjee, Monideepa Roy, Sarmistha Neogy. 671-683 [doi]
- Peak to Average Power Ratio Reduction in OFDM System over PAM, QAM and QPSK ModulationGaurav Sikri, Rajni. 685-690 [doi]
- MERCC: Multiple Events Routing with Congestion Control for WSNAyan Kumar Das, Rituparna Chaki. 691-698 [doi]
- Awareness Based Approach against E-Mail AttacksGaurav Kumar Tak, Gaurav Ojha. 699-708 [doi]
- On the Fly File Dereplication MechanismParas Gupta, Manu Vardhan, Akhil Goel, Abhinav Verma, Dharmender Singh Kushwaha. 709-718 [doi]
- Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud ServicesDurgesh Bajpai, Manu Vardhan, Sachin Gupta, Ravinder Kumar, Dharmender Singh Kushwaha. 719-728 [doi]
- Load Balancing in Cluster Using BLCR Checkpoint/RestartHemant Hariyale, Manu Vardhan, Ankit Pandey, Ankit Mishra, Dharmender Singh Kushwaha. 729-737 [doi]
- Adaptive Region Based Huffman Compression Technique with Selective Code InterchangingUtpal Nandi, Jyotsna Kumar Mandal. 739-748 [doi]
- Human Tracking in Video SurveillanceHelly Patel, Mahesh P. Wankhade. 749-756 [doi]
- Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANETManpreet Kaur, Rajni, Parminder Singh. 757-763 [doi]
- An Efficient Approach to Secure Routing in MANETDipayan Bose, Arnab Banerjee, Aniruddha Bhattacharyya, Himadri Nath Saha, Debika Bhattacharyya, P. K. Banerjee. 765-776 [doi]
- Trust Oriented Secured AODV Routing Protocol against Rushing AttackSwarnali Hazra, S. K. Setua. 777-788 [doi]
- SEPastry: Security Enhanced PastryMadhumita Mishra, Somanath Tripathy, Sathya Peri. 789-795 [doi]
- Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSRKoushik Majumder, Sudhabindu Ray, Subir Kumar Sarkar. 797-806 [doi]