Abstract is missing.
- A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear PolynomialsVanga Odelu, Ashok Kumar Das, Adrijit Goswami. 1-10 [doi]
- Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial InterpolationB. R. Purushothama, Bharat Amberker. 11-22 [doi]
- Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion DetectionNelcileno Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Nascimento, Ailton Shinoda Akira, Bharat K. Bhargava. 23-34 [doi]
- ID-Based Threshold Signcryption and Group UnsigncryptionPrashant Kumar Mishra, Kunwar Singh, Sudhanshu Baruntar. 35-44 [doi]
- Protocol for Secure Submissions into Learning Management SystemsManjunath Mattam. 45-53 [doi]
- Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANETMonika Darji, Bhushan Trivedi. 54-63 [doi]
- WAKE: Authentication and Key Establishment for Wireless Mesh NetworkSomanath Tripathy, Debasish Sahoo. 64-74 [doi]
- Effective Implementation of DES Algorithm for Voice ScramblingJinu Elizabeth John, A. S. Remya Ajai, Prabaharan Poornachandran. 75-84 [doi]
- Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric InternetworkingAmine Abidi, Ghazi Ben Ayed, Farouk Kamoun. 85-96 [doi]
- Security Analysis of CAPTCHAAnjali Avinash Chandavale, Ashok M. Sapkal. 97-109 [doi]
- Imperceptible Image Indexing Using Digital WatermarkingAbraham Jobin, Paul Varghese. 110-116 [doi]
- A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime NumbersSrikumar Manghat. 117-126 [doi]
- Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCB. G. Nagaraja, H. S. Jayanna. 127-134 [doi]
- Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key TreeB. R. Purushothama, Kusuma Shirisha, Bharat Amberker. 135-146 [doi]
- An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc NetworksRam Shringar Raw, Daya Krishan Lobiyal, Sanjoy Das. 147-156 [doi]
- Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion ToolV. Vasanthi, M. Hemalatha. 157-167 [doi]
- Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash FunctionsAravind Ashok, Prabaharan Poornachandran, Krishnashree Achuthan. 168-177 [doi]
- Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced DatabasesLucas Rodrigo Raso Mattos, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy. 178-184 [doi]
- A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical AttacksTiana Razafindralambo, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet. 185-194 [doi]
- Taxonomy of Slow DoS Attacks to Web ApplicationsEnrico Cambiaso, Gianluca Papaleo, Maurizio Aiello. 195-204 [doi]
- Crypto-Precision: Testing Tool for Hash FunctionHarshvardhan Tiwari, Ankit Luthra, Himanshu Goel, Sambhav Sharma, Krishna Asawa. 205-214 [doi]
- Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DESP. V. Sruthi, Prabaharan Poornachandran, A. S. Remya Ajai. 215-224 [doi]
- Towards Retrieving Live Forensic Artifacts in Offline ForensicsS. Dija, T. R. Deepthi, C. Balan, K. L. Thomas. 225-233 [doi]
- Carving of Bitmap Files from Digital Evidences by Contiguous File FilteringBalan Chelliah, Divya S. Vidyadharan, P. Shabana, K. L. Thomas. 234-239 [doi]
- Lightweight Cryptographic Primitives for Mobile Ad Hoc NetworksAdarsh Kumar, Alok Aggarwal. 240-251 [doi]
- Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse ProxyS. Fouzul Hidhaya, Angelina Geetha. 252-263 [doi]
- Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric CryptosystemsP. R. Mahalingam. 264-271 [doi]
- Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged GroupsMuthulakshmi Angamuthu, Anitha Ramalingam, S. Rohini, Krishnan Princy. 272-282 [doi]
- A Virtualization-Level Future Internet Defense-in-Depth ArchitectureJerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski. 283-292 [doi]
- Experimental DRM Model Using Mobile Code and White-Box EncryptionStefan-Vladimir Ghita, Victor Valeriu Patriciu, Ion Bica. 293-303 [doi]
- Towards a Secure, Transparent and Privacy-Preserving DRM SystemDheerendra Mishra, Sourav Mukhopadhyay. 304-313 [doi]
- Time Based Constrained Object Identification in a Dynamic Social NetworkM. T. Chitra, R. Priya, Elizabeth Sherly. 314-322 [doi]
- A New Approach towards Segmentation for Breaking CAPTCHAAnjali Avinash Chandavale, Ashok M. Sapkal. 323-335 [doi]
- A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network ForensicsAman Jantan, Mohammad Rasmi, Mohd Izham Ibrahim, Azri H. A. Rahman. 336-346 [doi]
- Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless TelecardiologyNilanjan Dey, Anamitra Bardhan Roy, Achintya Das, Sheli Sinha Chaudhuri. 347-357 [doi]
- eCloudIDS - Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing EnvironmentMadhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy. 358-371 [doi]
- A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc NetworkSubhashis Banerjee, Koushik Majumder. 372-384 [doi]
- Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering InstallationsPhilipp Digeser, Marco Tubolino, Martin Klemm, Axel Sikora. 385-395 [doi]
- A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc NetworksSubhashis Banerjee, Koushik Majumder. 396-407 [doi]
- iReSign - Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture Using Hybrid Region-Based Shape Representation TechniquesKeerthi Balasundaram, Madhan Kumar Srinivasan, K. Sarukesi. 408-421 [doi]
- Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key GenerationS. Santhanalakshmi, T. S. B. Sudarshan, Gopal K. Patra. 422-431 [doi]
- eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing EnvironmentMadhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy. 432-443 [doi]
- Implementation of MD6Ananya Chowdhury, Utpal Kumar Ray. 444-455 [doi]
- Location Estimation of Mobile in GSM and CDMA NetworksAdapa Tataram, Alwyn Roshan Pais. 456-465 [doi]
- An Adaptive Distributed Intrusion Detection System for Cloud Computing FrameworkDeepa Krishnan, Madhumita Chatterjee. 466-473 [doi]
- Biologically Inspired Computer Security System: The Way AheadPraneet Saurabh, Bhupendra Verma, Sanjeev Sharma. 474-484 [doi]
- A Comparative Analysis of the Ant Based Systems for QoS Routing in MANETDebajit Sensarma, Koushik Majumder. 485-496 [doi]
- Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility AnalysisNitin Goel, Shruti Sangwan, Ajay Jangra. 497-506 [doi]