| December 2012, Volume 2, Number 4 |
Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment [Pdf] |
New Digital Signature Protocol Based on Elliptic Curves [Pdf] |
On the Cryptographic Measures and Chaotic Dynamical Complexity Measures [Pdf] |
Rectified Differential Cryptanalysis of 16 Round Present [Pdf] |
Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption [Pdf] |
Authentication Schemes Using Polynomials Over Non-Commutative Rings [Pdf] |
An Improved Certified E Mail Protocol Based on Author Based Selective Receipt [Pdf] |
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm [Pdf] |
Video Surveillance in the Cloud? [Pdf]
DJ Neal and Syed (Shawon) Rahman, Capella University, USA
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocols and Biometrics Technology [Pdf]
V.K. Narendira Kumar and B. Srinivasan, Gobi Arts & Science College (Autonomous), India
Language-Based Security to Apply Computer Security [Pdf]
Ali Ahmadian Ramaki and Reza Ebrahimi Atani, Guilan University, Iran
Tripartite Key Agreement Protocol using Triple Decomposition Search Problem [Pdf]
T.Isaiyarasi1, K.Sankarasubramanian2, 1Valliammai Engineering College,India and 2Sri Sairam Engineering College,India
Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems [Pdf]
Vinay S. Iyengar, Oregon Episcopal School, USA
Enhancing Security of Quality Song with Embedding Encrypted Hidden Code in Tolerance Level (SQHTL) [Pdf]
Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2University of Kalyani,India
Blind Image Steganalysis Based on Contourlet Transform [Pdf]
Natarajan V and R Anitha, PSG College of Technology,India
A Defense Mechanism for Credit Card Fraud Detection [Pdf]
M.Sasirekha, Sumaiya Thaseen .I and Saira Banu.J, VIT University,India
A Novel Approach for Cryptography Technique on Perturbed Data for Distributed Environment [Pdf]
Nishant Doshi, National Institute of Technology, India
A Secure Encryption Logic for Communication in Wireless Sensor Networks [Pdf]
Shanta Mandal and Rituparna Chaki, West Bengal University of ,India
Architectural Optimization of AES Transformations and Keyexpansion [Pdf]
K. Rahimunnisa1, M. Priya Zach1, S. Suresh Kumar2, J.Jayakumar2, 1Karunya University,India, 2Dr. N.G.P Institute of Technology,India
Image Encryption Using Fibonacci-Lucas Transformation [Pdf]
Minati Mishra1, Priyadarsini Mishra2, M.C. Adhikary1 and Sunit Kumar3, 1F.M. University, India, 2District Rural Development Agency, India and 3Kolhan University, India
Performance of Error Filters in Halftone Visual Cryptography [Pdf]
Anshul Sharma, Chandigarh University, India
Secure Data Transmission Using Steganography and Encryption Technique [Pdf]
Shamim Ahmed Laskar and Kattamanchi Hemachandran, Assam University, India
ECG Based Human Authentication using Wavelets and Random Forests [Pdf]
Noureddine Belgacem1, Amine Nait-Ali2, Regis Fournier2 and Fethi Bereksi-Reguig1, 1Abou Bekr Belkaid University, Algeria and 2UPEC University, France.
Implementation of a New Methodology to Reduce the Effects of Changes of Illumination in Face Recognition-based Authentication [Pdf]
Andres Alarcon-Ramirez and Mohamed F. Chouikha, Howard University, Washington DC
Implementation and Analysis of Homomorphic Encryption Schemes [Pdf]
Nitin Jain1, Saibal K. Pal2 and Dhananjay K. Upadhyay2, 1Guru Gobind Singh Indraprastha University, India. and 2DRDO, Metcalfe House Complex, India.
A Hybrid Approach to Counter Application Layer DDOS Attacks [Pdf]
S. Renuka Devi and P. Yogesh, AnnaUniversity, India
Mitigating Strategy to Shield the VPN Service from DoS Attack [Pdf]
S.Saraswathi and P.Yogesh, Anna University-Chennai, India
Cryptanalyzing of Message Digest Algorithms MD4 and MD5 [Pdf]
Md. Alam Hossain, Md. Kamrul Islam, Subrata Kumar Das and Md. Asif Nashiry,Jessore Science & Technology University Bangladesh.
Avoiding Wormhole Attack in MANET using Statistical Analysis Approach [Pdf]
Saurabh Upadhyay1 and Aruna Bajpai2, 1Sarvottam Institute of technology and Management, Greater Noida, India and 2Samrat Ashok Technological Institute-Vidisha,India.
Enhancing the Network Security Using Amalgam Games [Pdf]
T.P.Anithaashri and R.Baskaran, Anna University-Chennai, India
Chaos Based Mixed Keystream Generation for Voice Data Encryption [Pdf]
Musheer Ahmad1, Bashir Alam1 and Omar Farooq2, 1Jamia Millia Islamia, India and 2ZH College of Engineering and Technology, India
Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping [Pdf]
Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa B, National Institute of Technology Karnataka, Surathkal
Robust Speech Coding Algorithm [Pdf]
Akella Amarendra Babu1 and Ramadevi Yellasiri2, 1Progressive Engineering College, India and 2Chaitanya Bharathi Institute of Technology, India