A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features Angel R. Otero1, Carlos E. Otero2 and Abrar Qureshi2, 1Nova Southeastern University, USA and 2University of Virginia's College at Wise, USA
Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option FIeld: A Characterization Danilo Valeros Bernardo and Doan B Hoang, The University of Technology- Sydney, Australia
Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique M. Kiran Kumar1, S. Mukthyar Azam1 and Shaik Rasool2,
1R.V.R & J.C College of Engg, India and 2S.C.E.T, India
Verification of Quantum Cryptography Protocols by Model Checking Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi1,3, 1FSO, University Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist, Morocco and 3Academy Hassan II of Sciences & Technology, Morocco
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks Vivaksha Jariwala1 and D. C. Jinwala2, 1C. K. Pithawalla College of Engineering and Technology, India and 2S. V. National Institute of Technology, India
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN Mohammed A. Abuhelaleh and Khaled M. Elleithy, University Of Bridgeport, USA
Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless Sensor Network Vikas Kumar1 and Rajender Kumar2,
NIT- kurukshetra, India
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network Jaydip Sen, Tata Consultancy Services Ltd - Kolkata, India
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-Server Environment Rafael Martinez-Pelaez1,2, Francisco Rico-Novella1, Cristina Satizabal2 and Jacek Pomykala3, 1Technical University of Catalonia, Spain, 2Universidad de la Sierra Sur, Mexico and 3Warsaw University, Poland
A (2,N) Visual Cryptographic Technique for Banking Applications Jayanta Kumar Pal1, J. K. Mandal2 and Kousik Dasgupta1, 1Kalyani Government Engineering College, India and 2University of Kalyani, India
Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents Mueen Uddin1, Kamran Khowaja2 and Azizah Abdul Rehman1, 1UTM, Malaysia and 2Isra University, Pakistan
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis, Kingston University - London, United Kingdom
Lightweight C&C based botnet detection using Aho-Corasick NFA Udhayan J1, Anitha R2 and Hamsapriya T2, 1Karunya University, India and 2PSG College of Technology, India
Emergency Response Communications and Associated Security Challenges Muhammad Ibrahim Channa and Kazi M. Ahmed, Asian Institute of Technology, Thailand
A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN Soumya Maity, P Bera, S K Ghosh and Pallab Dasgupta, Indian Institute of Technology - Kharagpur, India
Additional Papers
Effective Voice Calls Admission for Authorized User in Inter VOIP Network Subashri T and Vaidehi V, Anna University - Chennai, India
ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan Muraleedharan N and Arun Parmar, Centre for Development of Advanced Computing (C-DAC), India
Improving the Reliability of Detection of LSB Replacement Steganography Shreelekshmi R1, Wilscy M2 and C E Veni Madhavan3, 1College of Engineering -Trivandrum, India, 2University of Kerala, India and 3Indian Institute of Science, India
Zero Data Remnance Proof in Cloud Storage Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India
Bayesian Based Comment Spam Defending Tool Dhinaharan Nagamalai1, Beatrice Cynthia Dhinakaran2 and Jae Kwang Lee2, 1Wireilla Net Solutions, Australia and 2Hannam University, South Korea
A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords Dhananjay Kulkarni,
Boston University, USA.
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next Generation High Rate WPAN Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard,
Institute of Electronics and Telecommunications of Rennes (IETR),France.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers Chang N. Zhang, Qian Yu and Xiao Wei Liu,
University of Regina, Canada.
Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs Theodore Zahariadis1, Helen Leligou1, Panagiotis Karkazis5,Panagiotis Trakadas2, Ioannis Papaefstathiou5,Charalambos Vangelatos3 and Lionel Besson4, 1 Technological Educational Institute of Chalkis, Greece,2 Hellenic Authority for Communications Security and Privacy (ADAE), Greece,3 Hellenic Aerospace Industry S.A., Greece,4 Thales Communications, France and 5 Technical University of Crete, Greece.
Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics Timers Pavaday Narainsamy,Soyjaudah Sunjiv and Nugessur Shrikaant,
University of Mauritius.
Improving TLS Security By Quantum Cryptography Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi3,
1FSO, University Mohamed Ist, Morocco,2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco.
Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network
Mohammad Saiful Islam Mamun1 and A.F.M. Sultanul Kabir2,
1Stamford University ,Bangladesh and 2American International University,Bangladesh.
Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network
S. Albert Raebra1 and S. Vijayalakshmi2,
1St.Josephs College, Bharathidasan University,India and 2Pondicherry University, India
An Efficient IP Traceback Through Packet Marking Algorithm
Y.Bhavani and P.Niranjan Reddy,Kakatiya Institute of Technology and Science,India.
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment
K R Chandrasekhara Pillai1 and M P Sebastian2,
1N S S College of Engineering,India and 2Indian Institute of Management, India
Wireless Security Measurement Using Data Value Index
Reza Amirpoor, 1Ajay Kumar 2 and Satish R. Deavne 3,1Bharati Vidyapeeth University,India,2JSPMs JAYAWANT Institute of Computer Applications,India and 3DR.D. Y. Patil Ramrao Adik Institute of Technology,India.
An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error Concealment Amit Phadikar1 and Santi P. Maity 2,
1MCKV Institute of Engineering,India and 2Bengal Engineering and Science University, India
Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services Urjita Thakar1, Nirmal Dagdee2 and Sudarshan Varma3,
1Shri G.S. Institute of Technology and Science,India,2S.D. Bansal College of Technology,India and 3Ideavate Solutions, USA.
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Rajesh P Singh, Anupam Saikia and B. K. Sarma, Indian Institute of Technology, Guwahati, India
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
Dewan Md. Farid1, Nouria Harbi1, and Mohammad Zahidur Rahman2,
1University Lumiere Lyon 2 - France and 2Jahangirnagar University, Bangladesh
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem, Ain Shams University, EGYPT
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
S.Sangeetha1 & V.Vaidehi2,
1Angel College of Engineering, India and 2Madras Institute of Technology, India
Events Classification in Log Audit
Sabah Al-Fedaghi and Fahad Mahdi, Kuwait University, Kuwait
Analysis of the Security of BB84 by Model Checking
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi13,
1FSO, University Mohamed Ist, Morocco, 2ESTO, University Mohamed Ist,Morocco and 3Academy Hassan II of Sciences & Technology, Morocco
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor
Mohsen Machhout1, Zied Guitouni1, Kholdoun Torki2, Lazhar Khriji3
and Rached Tourki1,
1Faculty of Sciences of Monastir, Tunisia,2TIMA - CMP Laboratory, France and 3Sultane Qaboos University, Oman
Impersonation Attack on EKE Protocol
Shirisha Tallapally , Vaagdevi College of Engineering, India
A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy-Constrained Devices
Kin Choong Yow and Amol Dabholkar, Nanyang Technological University,Singapore
Trust Based Content Distribution for Peer-To-Peer Overlay Networks
S.Ayyasamy1 and S.N. Sivanandam2,
1Tamilnadu College of Engineering, India and 2PSG College of Technology, India
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET
T.V.P.Sundararajan and A.Shanmugam,Bannari Amman Institute of Technology, Sathyamangalam,India
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
Ulrich Herberg and Thomas Clausen,Ecole Polytechnique, France
Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks
James Cannady, Nova Southeastern University, USA
A Frame Work for Ontological Privacy Preserved Mining
Geetha Mary. A and Sriman Narayana Iyengar. N.Ch,
VIT University, India.
Workload Characterization of Spam Email Filtering Systems
Yan Luo, University of Massachusetts Lowell, USA
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio
and Video Cover Media
Natarajan Meghanathan and Lopamudra Nayak, Jackson State University, USA
Weakness on Cryptographic Schemes Based on Regular LDPC Codes
Omessaad Hamdi1 , Manel abdelhedi2, Ammar Bouallegue2 and Sami Harari3, 1SYSTEL, SUPCOM, Tunisia,
2SYSCOM, ENIT, Tunisia and
3SIS, USTV, France.
Advanced Security Management in Metro Ethernet Networks
Ammar Rayes, Cisco Systems, USA
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application 1Syed S. Rizvi, 2Aasia Riasat and 3Khaled M. Elleithy,1, 3University of Bridgeport, USA and
2Institute of Business Management, Pakistan.
Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures
Wassim Itani, Ayman Kayssi and Ali Chehab,American University of Beirut, Lebanon