Volume 2

December 2012, Volume 2, Number 4
  • Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment   
    Alexander Beck, Jens Graupmann and Frank Ortmeier, Otto-von-Guericke-University, Germany
  • New Digital Signature Protocol Based on Elliptic Curves   
    Ounasser Abid, Jaouad Ettanfouhi and Omar Khadir, University of Hassan II Mohammedia-Casablanca, Morocco
  • On the Cryptographic Measures and Chaotic Dynamical Complexity Measures   
    Hanping Hu, LingFeng Liu, Huazhong University of Science &Technology, China
  • Rectified Differential Cryptanalysis of 16 Round Present   
    Manoj Kumar, Pratibha Yadav and Meena Kumari, SAG, DRDO,India
  • Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption   
    S G Srikantaswamy and H D Phaneendra, National Institute of Engineering, Mysore,India
  • Authentication Schemes Using Polynomials Over Non-Commutative Rings   
    Maheswara Rao Valluri, Fiji National University, Fiji
  • An Improved Certified E Mail Protocol Based on Author Based Selective Receipt   
    Ranadeep Mukherjee and Ambar Dutta, Birla Institute of Technology,India
  • Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm   
    S. Fouzul Hidhaya and Angelina Geetha, B.S. Abdur Rahman University, India
September 2012, Volume 2, Number 3
  • Video Surveillance in the Cloud?   
    DJ Neal and Syed (Shawon) Rahman, Capella University, USA
  • Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocols and Biometrics Technology   
    V.K. Narendira Kumar and B. Srinivasan, Gobi Arts & Science College (Autonomous), India
  • Language-Based Security to Apply Computer Security   
    Ali Ahmadian Ramaki and Reza Ebrahimi Atani, Guilan University, Iran
  • Tripartite Key Agreement Protocol using Triple Decomposition Search Problem   
    T.Isaiyarasi1,K.Sankarasubramanian2, 1Valliammai Engineering College,India and 2Sri Sairam Engineering College,India
  • Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems   
    Vinay S. Iyengar, Oregon Episcopal School, USA
  • Enhancing Security of Quality Song with Embedding Encrypted Hidden Code in Tolerance Level (SQHTL)   
    Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2University of Kalyani,India
  • Blind Image Steganalysis Based on Contourlet Transform   
    Natarajan V and R Anitha, PSG College of Technology,India
  • A Defense Mechanism for Credit Card Fraud Detection   
    M.Sasirekha, Sumaiya Thaseen .I and Saira Banu.J, VIT University,India
  • A Novel Approach for Cryptography Technique on Perturbed Data for Distributed Environment   
    Nishant Doshi, National Institute of Technology, India
  • A Secure Encryption Logic for Communication in Wireless Sensor Networks   
    Shanta Mandal and Rituparna Chaki, West Bengal University of ,India
  • Architectural Optimization of AES Transformations and Keyexpansion   
    K. Rahimunnisa1, M. Priya Zach1, S. Suresh Kumar2, J.Jayakumar2, 1Karunya University,India, 2Dr. N.G.P Institute of Technology,India
  • Image Encryption Using Fibonacci-Lucas Transformation    
    Minati Mishra1, Priyadarsini Mishra2, M.C. Adhikary1 and Sunit Kumar3, 1F.M. University, India, 2District Rural Development Agency, India and 3Kolhan University, India
  • Performance of Error Filters in Halftone Visual Cryptography   
    Anshul Sharma, Chandigarh University, India
  • Secure Data Transmission Using Steganography and Encryption Technique   
    Shamim Ahmed Laskar and Kattamanchi Hemachandran, Assam University, India
June 2012, Volume 2, Number 2
  • ECG Based Human Authentication using Wavelets and Random Forests   
    Noureddine Belgacem1, Amine Nait-Ali2, Regis Fournier2 and Fethi Bereksi-Reguig1, 1Abou Bekr Belkaid University, Algeria and 2UPEC University, France.
  • Implementation of a New Methodology to Reduce the Effects of Changes of Illumination in Face Recognition-based Authentication   
    Andres Alarcon-Ramirez and Mohamed F. Chouikha, Howard University, Washington DC
  • Implementation and Analysis of Homomorphic Encryption Schemes   
    Nitin Jain1, Saibal K. Pal2 and Dhananjay K. Upadhyay2, 1Guru Gobind Singh Indraprastha University, India. 2DRDO, Metcalfe House Complex, India
  • A Hybrid Approach to Counter Application Layer DDOS Attacks   
    S. Renuka Devi and P. Yogesh, AnnaUniversity, India
  • Mitigating Strategy to Shield the VPN Service from DoS Attack   
    S.Saraswathi and P.Yogesh, Anna University-Chennai, India
March 2012, Volume 2, Number 1
  • Cryptanalyzing of Message Digest Algorithms MD4 and MD5   
    Md. Alam Hossain, Md. Kamrul Islam, Subrata Kumar Das and Md. Asif Nashiry,Jessore Science & Technology University Bangladesh.
  • Avoiding Wormhole Attack in MANET using Statistical Analysis Approach   
    Saurabh Upadhyay1 and Aruna Bajpai2,1Sarvottam Institute of technology and Management, Greater Noida, India and 2Samrat Ashok Technological Institute-Vidisha,India.
  • Enhancing the Network Security Using Amalgam Games   
    T.P.Anithaashri and R.Baskaran, Anna University-Chennai, India
  • Chaos Based Mixed Keystream Generation for Voice Data Encryption   
    Musheer Ahmad1, Bashir Alam1 and Omar Farooq2, 1Jamia Millia Islamia, India and 2ZH College of Engineering and Technology, India
  • Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping   
    Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa B, National Institute of Technology Karnataka, Surathkal
  • Robust Speech Coding Algorithm   
    Akella Amarendra Babu1 and Ramadevi Yellasiri2, 1Progressive Engineering College, India and 2Chaitanya Bharathi Institute of Technology, India