COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

December 2012, Volume 2, Number 4 

Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment  [Pdf
Alexander Beck, Jens Graupmann and Frank Ortmeier, Otto-von-Guericke-University, Germany

New Digital Signature Protocol Based on Elliptic Curves  [Pdf
Ounasser Abid, Jaouad Ettanfouhi and Omar Khadir, University of Hassan II Mohammedia-Casablanca, Morocco

On the Cryptographic Measures and Chaotic Dynamical Complexity Measures  [Pdf
Hanping Hu, LingFeng Liu, Huazhong University of Science &Technology, China

Rectified Differential Cryptanalysis of 16 Round Present  [Pdf
Manoj Kumar, Pratibha Yadav and Meena Kumari, SAG, DRDO,India

Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption  [Pdf
S G Srikantaswamy and H D Phaneendra, National Institute of Engineering, Mysore,India

Authentication Schemes Using Polynomials Over Non-Commutative Rings  [Pdf
Maheswara Rao Valluri, Fiji National University, Fiji

An Improved Certified E Mail Protocol Based on Author Based Selective Receipt  [Pdf
Ranadeep Mukherjee and Ambar Dutta, Birla Institute of Technology,India

Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm  [Pdf
S. Fouzul Hidhaya and Angelina Geetha, B.S. Abdur Rahman University, India

September 2012, Volume 2, Number 3 

Video Surveillance in the Cloud?  [Pdf
DJ Neal and Syed (Shawon) Rahman, Capella University, USA

Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocols and Biometrics Technology  [Pdf
V.K. Narendira Kumar and B. Srinivasan, Gobi Arts & Science College (Autonomous), India

Language-Based Security to Apply Computer Security  [Pdf
Ali Ahmadian Ramaki and Reza Ebrahimi Atani, Guilan University, Iran

Tripartite Key Agreement Protocol using Triple Decomposition Search Problem  [Pdf
T.Isaiyarasi1, K.Sankarasubramanian2, 1Valliammai Engineering College,India and 2Sri Sairam Engineering College,India

Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems  [Pdf
Vinay S. Iyengar, Oregon Episcopal School, USA

Enhancing Security of Quality Song with Embedding Encrypted Hidden Code in Tolerance Level (SQHTL)  [Pdf
Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2University of Kalyani,India

Blind Image Steganalysis Based on Contourlet Transform  [Pdf
Natarajan V and R Anitha, PSG College of Technology,India

A Defense Mechanism for Credit Card Fraud Detection  [Pdf
M.Sasirekha, Sumaiya Thaseen .I and Saira Banu.J, VIT University,India

A Novel Approach for Cryptography Technique on Perturbed Data for Distributed Environment  [Pdf
Nishant Doshi, National Institute of Technology, India

A Secure Encryption Logic for Communication in Wireless Sensor Networks  [Pdf
Shanta Mandal and Rituparna Chaki, West Bengal University of ,India

Architectural Optimization of AES Transformations and Keyexpansion  [Pdf
K. Rahimunnisa1, M. Priya Zach1, S. Suresh Kumar2, J.Jayakumar2, 1Karunya University,India, 2Dr. N.G.P Institute of Technology,India

Image Encryption Using Fibonacci-Lucas Transformation   [Pdf
Minati Mishra1, Priyadarsini Mishra2, M.C. Adhikary1 and Sunit Kumar3, 1F.M. University, India, 2District Rural Development Agency, India and 3Kolhan University, India

Performance of Error Filters in Halftone Visual Cryptography  [Pdf
Anshul Sharma, Chandigarh University, India

Secure Data Transmission Using Steganography and Encryption Technique  [Pdf
Shamim Ahmed Laskar and Kattamanchi Hemachandran, Assam University, India

June 2012, Volume 2, Number 2 

ECG Based Human Authentication using Wavelets and Random Forests  [Pdf
Noureddine Belgacem1, Amine Nait-Ali2, Regis Fournier2 and Fethi Bereksi-Reguig11Abou Bekr Belkaid University, Algeria and 2UPEC University, France.

Implementation of a New Methodology to Reduce the Effects of Changes of Illumination in Face Recognition-based Authentication  [Pdf
Andres Alarcon-Ramirez and Mohamed F. Chouikha, Howard University, Washington DC

Implementation and Analysis of Homomorphic Encryption Schemes  [Pdf
Nitin Jain1, Saibal K. Pal2 and Dhananjay K. Upadhyay21Guru Gobind Singh Indraprastha University, India. and 2DRDO, Metcalfe House Complex, India.

A Hybrid Approach to Counter Application Layer DDOS Attacks  [Pdf
S. Renuka Devi and P. Yogesh, AnnaUniversity, India

Mitigating Strategy to Shield the VPN Service from DoS Attack  [Pdf
S.Saraswathi and P.Yogesh, Anna University-Chennai, India

March 2012, Volume 2, Number 1 

Cryptanalyzing of Message Digest Algorithms MD4 and MD5  [Pdf
Md. Alam Hossain, Md. Kamrul Islam, Subrata Kumar Das and Md. Asif Nashiry,Jessore Science & Technology University Bangladesh.

Avoiding Wormhole Attack in MANET using Statistical Analysis Approach  [Pdf
Saurabh Upadhyay1 and Aruna Bajpai2, 1Sarvottam Institute of technology and Management, Greater Noida, India and 2Samrat Ashok Technological Institute-Vidisha,India.

Enhancing the Network Security Using Amalgam Games  [Pdf
T.P.Anithaashri and R.Baskaran, Anna University-Chennai, India

Chaos Based Mixed Keystream Generation for Voice Data Encryption  [Pdf
Musheer Ahmad1, Bashir Alam1 and Omar Farooq2, 1Jamia Millia Islamia, India and 2ZH College of Engineering and Technology, India

Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping  [Pdf
Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa B, National Institute of Technology Karnataka, Surathkal

Robust Speech Coding Algorithm  [Pdf
Akella Amarendra Babu1 and Ramadevi Yellasiri2, 1Progressive Engineering College, India and 2Chaitanya Bharathi Institute of Technology, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN