Volume 3

December 2013, Volume 3, Number 4
  • A Pairing-Free Identity Based Tripartite Signcryption Scheme   
    Hassan M. Elkamchouchi1, Eman F. Abou Elkheir2 and Yasmine Abouelseoud1, 1Alexandria University, Egypt and 2Kafr El-Sheikh University, Egypt
  • A New Attack on RSA With a Composed Decryption Exponent   
    Abderrahmane Nitaj1 and Mohamed Ould Douh1,2, 1Universite de Caen, France and 2Universite des Sciences, Mauritania
September 2013, Volume 3, Number 3
  • Performance Analysis of Sha-2 and Sha-3 Finalists   
    Ram Krishna Dahal1, Jagdish Bhatta1 and Tanka Nath Dhamala2, 1Tribhuvan University, Nepal and 2University of Kaiserslautern, Germany
  • A Secure Block Permutation Image Steganography Algorithm   
    Hussein Al-Bahadili, University of Petra, Jordan
  • Blind and Robust Images Watermarking Based on Wavelet and Edge Insertion   
    Henri Bruno Razafindradina1 and Attoumani Mohamed Karim2, 1Higher Institute of Technology, Diego Suarez - Madagascar and 2Comoros ICT Regulation Authority, Comoros
  • Elliptic Curve Cryptography in Securing Networks by Mobile Authentication   
    Manoj Prabhakar, Anna University, India
June 2013, Volume 3, Number 2
  • An Improvement to the Set Protocol Based on Signcryption    
    Hassan M. Elkamchouchi 1, Eman F. Abu Elkhair2 and Yasmine Abouelseoud1,1Alexandria University,Egypt, 2 Kafr El-Sheikh University, Egypt.
  • An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet   
    Manpreet Kaur1, Rajni1 and Parminder Singh2,1 S.B.S.S.T.C, Ferozepur, 2Chandigarh Group of Colleges, Landran.
  • A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk   
    R.Mahesh and T.Meyyappan, Alagappa University, India
March 2013, Volume 3, Number 1
  • Secure Image Transfer in The Domain Transform DFT   
    Rakotondraina Tahina Ezechiel and Rakotomalala Mamy Alain, University of Antananarivo, Madagascar
  • Hardware Implementation of Algorithm for Cryptanalysis   
    Harshali Zodpe1, Prakash Wani2, Rakesh Mehta3, 1Maharashtra Institute of Technology,ndia, 2College of Engineering, Pune, India and 3Mechatronics Test Equipments (I) Pvt. Ltd.,India
  • A Secure Color Image Steganography in Transform Domain   
    Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, Manipal University, India
  • Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography   
    Sangram Ray and G. P. Biswas, Indian School of Mines, India