Information Security Synthesis in Online Universities |
Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA |
Volume : 3 volume number : 5 pdf |
A Multiple Ballots Election Scheme Using Anonymous Distribution |
Manabu Okamoto, Kanagawa Institute of Technology, Japan |
Volume : 3 volume number : 5 pdf |
Enhanced Secure Algorithm for Message Communication |
Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India |
Volume : 3 volume number : 5 pdf |
Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack |
Vikram Singh and Vatika, Chaudhary Devi Lal University, India |
Volume : 3 volume number : 5 pdf |
An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users |
Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand |
Volume : 3 volume number : 5 pdf |
Simulation of the Combined Method |
Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia |
Volume : 3 volume number : 5 pdf |
Prevention of Wormhole Attack in Wireless Sensor Network |
Dhara Buch1 and Devesh Jinwala2, 1Government Engineering College Rajkot, India and 2S.V. National Institute of Technology, India |
Volume : 3 volume number : 5 pdf |
DDNFS: a Distributed Digital Notary File System |
Alexander Zanger, Bond University, Australia |
Volume : 3 volume number : 5 pdf |
Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN |
R.Seshadri1 and N..Penchalaiah2, 1S.V.University, India and 2ASCET, India |
Volume : 3 volume number : 5 pdf |
Handwritten Text Image Authentication Using Back Propagation |
A S N Chakravarthy1, Penmetsa V Krishna Raja2 and P S Avadhani3, 1Sri Aditya Engineering College, India, 2JNTUK, India and 3Andhra University, India |
Volume : 3 volume number : 5 pdf |
A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks |
Hossein Jadidoleslamy, The University of Guilan, Iran |
Volume : 3 volume number : 5 pdf |
BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks |
Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria |
Volume : 3 volume number : 5 pdf |
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent |
Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi, GLS Institute of Computer Technology, India |
Volume : 3 volume number : 5 pdf |
Botnet Command Detection using Virtual Honeynet |
J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India |
Volume : 3 volume number : 5 pdf |
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack |
L.Kavisankar and C.Chellappan, Anna University, India |
Volume : 3 volume number : 5 pdf |
Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks usingReed Solomon Code for Key Predistribution |
Pinaki Sarkar1 and Aritra Dhar2, 1Jadavpur University, India and 2Gurunanak Institute of Technology, India |
Volume : 3 volume number : 5 pdf |
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography |
G.Geetha1 and C.Jayakumar2, 1Jerusalem college of Engineering, India and 2RMK Engineering college, India |
Volume : 3 volume number : 5 pdf |
Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism |
Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela, India |
Volume : 3 volume number : 5 pdf |
Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET |
V. Anjana Devi1 and R. S. Bhuvaneswaran2, 1St. Joseph's College of Engineering, India and 2Anna University, India |
Volume : 3 volume number : 5 pdf |
Error Detection and Correction for Distributed Group Key Agreement Protocol |
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India |
Volume : 3 volume number : 5 pdf |
Error Detection and Correction for Distributed Group Key Agreement Protocol |
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India |
Volume : 3 volume number : 5 pdf |