A Cryptographic Mutual Authentication Scheme for Web Applications Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division Sumana M1 and Hareesha K S2, 1M S Ramaiah Institute of Technology, India and 2Manipal Institute of Technology, India
Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information Systems) Hani Qusa, University College of Applied Science, Palestine
Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India
Key Management Techniques in Wireless Sensor Networks Khawla Naji Shnaikat1 and Ayman Ahmed AlQudah2, 1University of Jordan, Jordan and 2University of Dammam, KSA
A Secure Electronic Payment Protocol for Wireless Mesh Networks Helen Cheung and Cungang Yang, Ryerson University, Canada
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India
Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation Peter Mell1 and Richard Harang2, 1National Institute of Standards and Technology, USA and 2U.S. Army Research Laboratory, USA
A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports Hamsha and Nagaraj, RVCE Bangalore, India
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools Waqas Aman, Gjovik University College, Norway
Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere UniversityKampala, Uganda
End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc Networks. Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA
Analysis of RSA Algorithm using GPU Programming Sonam Mahajan and Maninder Singh, Thapar University, India
Evaluation of Enhanced Security Solutions in 802.11-Based Networks Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria
Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering Pune, India
State of Mobile Banking in Tanzania and Security Issues Bossi Masamila, Dublin Institute of Technology, Ireland
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University of Khartoum, Sudan
Privacy Protection for Role-Based Access Control in Service Oriented Architecture Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada
Survey of Manet Misbehaviour Detection Approaches Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India
Attack Graph-Based Risk Assessment and Optimisation Approach Mohammed Alhomidi and Martin Reed, University of Essex, UK
Security Issues Associated with Big Data in Cloud Computing Venkata Narasimha Inukollu1 , Sailaja Arsi1 and Srinivasa Rao Ravuri2, 1Texas Tech University, USA
and 2Cognizant Technology Solutions, India
A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations FuiFui Wong and Cheng Xiang Tan, TongJi University, China
Role of Integrated Virtual E-Learning System for Distance Learning Students Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology for Women, India
Self-Protection Mechanism For Wireless Sensor Networks Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India
The Impact of Management Information systems(MIS) Technologies on the quality of Services provided at the University of TABUK Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan
Enhancing the Impregnability of Linux Servers Rama Koteswara Rao G1, Satya Prasad R2, Pathanjali Sastri A2 and P.E.S.N. Prasad1, 1Prasad V. Potluri Siddhartha Institute of Technology, India and 2Acharya Nagarjuna University, India
Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To Exploit Diversity Swati Chowdhuri1, Santanu Maiti1, Sheli Sinha Chaudhuriand2 and P.K.Baneerjee2, 1Seacom Engineering College, India and 2Jadavpur University, India
A New Hybrid Algorithm for Business Intelligence Recommender System P.Prabhu and N.Anbazhagan, Alagappa University, India
Optimised Malware Detection in Digital Forensics SaeedAlmarri1 and Paul Sant2, 1University of Bedfordshire, United Kingdom and 2University Campus Milton Keynes, United Kingdom
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach Shadi R. Masadeh1, Ahmad Azzazi2, Bassam A. Y. Alqaralleh3 and Ali, Mousa.Al Sbou3, 1Isra University, Jordan, 2Applied Science University, Jordan and 3Al-Hussein Bin Talal University, Jordan
Cloud Computing and Security Issues in the Cloud Monjur Ahmed1 and Mohammad Ashraf Hossain2, 1Daffodil Institute of IT, Bangladesh and 2Freelance IT Consultant, Bangladesh
A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service Oriented Architecture Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University, Mashhad, Iran
SPARQL: Semantic Information Retrieval by Embedding Prepositions Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University, India
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for Electronic Commerce Transactions and Payments Fahad A Alqahtani, De Montfort University, United Kingdom
An IAC Approach for Detecting Profile Cloning in Online Social Networks MortezaYousefi Kharaji1 and FatemehSalehi Rizi2, 1Mazandaran University of Science and Technology, Iran and 2Sheikhbahaee University of Isfahan, Iran
Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares Pallavi Vijay Chavan1, Mohammad Atique2 and Latesh Malik1, 1GHRCE - Nagpur, India and 2SGBAU -Amravati, India