Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security |
William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai, India |
Volume : 3 volume number : 6 pdf |
An Overview of Penetration Testing |
Aileen G. Bacudio1, Xiaohong Yuan1, Bei-Tseng Bill Chu2 and Monique Jones1, 1North Carolina A&T State University, USA and 2University of North Carolina at Charlotte, USA |
Volume : 3 volume number : 6 pdf |
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks |
Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, India |
Volume : 3 volume number : 6 pdf |
Enhancing Infrastructure Security in Real Estate |
Kyle Dees and Syed (Shawon) Rahman, Capella University, USA |
Volume : 3 volume number : 6 pdf |
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems. |
Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National Institute of Technology, India |
Volume : 3 volume number : 6 pdf |
Role of Multiple Encryption in Secure Electronic Transaction |
Himanshu Gupta1 and Vinod Kumar Sharma2, 1Amity University Campus, India and 2Gurukula Kangri Vishwavidyalaya, India |
Volume : 3 volume number : 6 pdf |
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis |
Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and Development Organisation (DRDO) - Bangalore, India |
Volume : 3 volume number : 6 pdf |
Statistical Quality Control Approaches to Network Intrusion Detection |
Rohitha Goonatilake1, Rafic Bachnak1 and Susantha Herath2, 1Texas A&M International University, USA and 2St. Cloud State University, USA |
Volume : 3 volume number : 6 pdf |
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks |
Pinaki Sarkar1, Amrita Saha2 and Samiran Bag3, 1Jadavpur University, India, 2IIT Bombay, India and 3Indian Statistical Institute, India |
Volume : 3 volume number : 6 pdf |
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key |
P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra University, India |
Volume : 3 volume number : 6 pdf |
User Authentication using Native Language Passwords |
Sreelatha Malempati1 and Shashi Mogalla2, 1R.V.R. & J.C. College of Engineering, India and 2Andhra University College of Engineering, India |
Volume : 3 volume number : 6 pdf |
Prediction of Malicious Objects in Computer Network and Defense |
Hemraj Sainia1, T. C. Panda2 and Minaketan Panda3, 1Alwar Institute of Engineering & Technology, India, 2Orissa Engineering College, India and 3SPANCO TELE, India |
Volume : 3 volume number : 6 pdf |
Blind Signature Scheme Based on Chebyshev Polynomials |
Maheswara Rao Valluri, Salalah College of Technology, Oman |
Volume : 3 volume number : 6 pdf |
Efficient Detection of Sybil attack Based on Cryptography in Vanet |
Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran |
Volume : 3 volume number : 6 pdf |
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm |
Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India |
Volume : 3 volume number : 6 pdf |
Experimenting with the Novel Approaches in Text Steganography |
Shraddha Dulera1, Devesh Jinwala1 and Aroop Dasgupta2, 1S V National Institute of Technology, India and 2Bhaskaracharya Institute for Space Applications and Geo-Informatics, India |
Volume : 3 volume number : 6 pdf |
Techniques and Tools for Forensic Investigation of E-mail |
M. Tariq Banday, University of Kashmir, India |
Volume : 3 volume number : 6 pdf |
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm |
S.G.Srikantaswamy1 and H.D.Phaneendra2, 1National Institute of Engineering - Mysore, India and 2 CSE NIE - Mysore, India |
Volume : 3 volume number : 6 pdf |
An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS |
K.Kuppusamy1 and S.Malathi2, 1Alagappa University, India and 2Manonmaniam Sundaranar University, India |
Volume : 3 volume number : 6 pdf |
Securing Mobile Agents in MANET against Attacks using Trust |
Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India |
Volume : 3 volume number : 6 pdf |