Cloud Computing Technology: Security and Trust Challenges [Pdf]
Sajjad Hashemi, Islamic Azad University, Iran |
Security System with Face Recognition, Sms Alert and Embedded Network Video Monitoring Terminal [Pdf]
J. Shankar Kartik, K. Ram Kumar and V.S. Srimadhavan, SRM Easwari Engineering College, India |
A Novel Multifactor Authentication System Ensuring Usability and Security [Pdf]
Gloriya Mathew and Shiney Thomas, Amal Jyothi College of Engineerng, India |
Malicious Pdf Document Detection Based on Feature Extraction and Entropy [Pdf]
Himanshu Pareek, Center for Development of Advanced Computing, India |
|
Data Storage Security Challenges in Cloud Computing [Pdf]
Sajjad Hashemi, Islamic Azad University, Iran |
YourPrivacyProtector: A Recommender System for Privacy Settings in Social Networks[Pdf]
Kambiz Ghazinour1,2, Stan Matwin1,2,4 and Marina Sokolova1,2,3, 1School of Electrical Engineering and Computer Science University of Ottawa, 2CHEO Research Institute, Canada, 3University of Ottawa, Canada and 4Dalhousie University, Canada |
Performance Evaluation of Message Security Using Fractal Sieve with MMD[Pdf]
Ch. Rupa, Vasireddy Venkatadri Institute of Technology, India |
June 2013, Volume 2, Number 3 |
A Smart Wizard System Suitable for Use With Internet Mobile Devices to Adjust Personal Information Privacy Settings (pdf)
Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia |
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET (pdf)
Bhuvaneshwari .k and A. Francis Saviour Devaraj, Oxford College of Engineering, India |
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET (pdf)
Vandana C.P and A. Francis Saviour Devaraj, Oxford College of Engineering, India |
| April 2013, Volume 2, Number 2 |
Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices (pdf)
Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia |
Managing the Intertwining Among Users, Roles, Permissions, and User Relationships in an Information Flow Control Model (pdf)
Shih-Chien Chou, National Dong Hwa University, Hualien, Taiwan |
An Evaluation of Energy Efficient Source Authentication Methods for False Data Filtering in WSN (pdf)
Syama M and Deepti C, The Oxford College of Engineering, India |
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service (pdf)
Ramya Shivanagu and Deepti C, The Oxford College of Engineering, India |
| February 2013, Volume 2, Number 1 |