Registered Papers
32 |
Mutual Authentication of RFID Tag with Multiple Readers |
47 |
Design space exploration of power efficient cache design techniques |
61 |
Secured WiMAX Communication at 60 GHz Millimeter-Wave for Road-Safety |
67 |
A Light-Weight Protocol for Data Integrity and Authentication in Wireless Sensor Networks |
103 |
Intrusion Detection using Flowbased Analysis of Network Traffic |
107 |
A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network |
128 |
Formal Verification of A Secure Mobile Banking Protocol |
139 |
A Novel Higly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication |
141 |
An Active Host-based Detection Mechanism for ARP-related Attacks |
150 |
Privacy Preservation Naïve Bayes Classification using Trusted Third Party Computation over Vertical Partitioned Distributed Progressive Sequential Data Streams |
151 |
Copyright Protection in Digital Multimedia |
174 |
Trust as a Standard for e-Commerce Infrastructure |
177 |
A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network |
180 |
Secure Data Aggregation in Wireless Sensor Networks using Privacy Homomorphism |
187 |
Deniable Encryption in Replacement of Untappable Channel to Prevent Coercion |
191 |
Author Identification in e-mail Forensic through Service Oriented Architecture |
196 |
A Chaos Based Approach for improving Non linearity in S Box Design of Symmetric Key Cryptosystems |
197 |
Implementation of Invisible Digital Watermarking by Embedding Data in Arithmetically Compressed Form into Image using Variable-Length Key |
Accepted Papers
3 |
Wireless Security Measurement Using Data Value Index |
9 |
Intrusion Detection Wireless Ad Hoc Network |
32 |
Mutual Authentication of RFID Tag with Multiple Readers |
38 |
Client side defense against MITM attacks on SSL/TLS using Negative Feedback method |
47 |
Design space exploration of power efficient cache design techniques |
55 |
A MBD-SIIT as a Multi homing based a new IPv4/IPv6 Novel transition mechanism in 4G networks. |
61 |
Secured WiMAX Communication at 60 GHz Millimeter-Wave for Road-Safety |
67 |
A Light-Weight Protocol for Data Integrity and Authentication in Wireless Sensor Networks |
70 |
Adaptive DS-CDMA Receiver with Code Tracking in Phase Unknown Environments |
86 |
Coastal Safety Oceanic Navigation Using Non-Gps Di gitised |
99 |
Power Optimization through Efficient Routing Technique for Dynamic Source Routing Protocol |
103 |
Intrusion Detection using Flowbased Analysis of Network Traffic |
105 |
Channel Adaptive MAC Protocol with Traffic-Aware Distributed Power Management in Wireless Sensor
Networks-Some Performance Issues |
107 |
A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network |
117 |
Legitimate Spyware Detection using Weighted Feature by Vector Space Model for EULA |
123 |
Improving Data Accessibility in Mobile Ad Hoc Networks |
128 |
Formal Verification of A Secure Mobile Banking Protocol |
139 |
A Novel Higly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication |
141 |
An Active Host-based Detection Mechanism for ARP-related Attacks |
150 |
Privacy Preservation Naïve Bayes Classification using Trusted Third Party Computation over Vertical Partitioned Distributed Progressive Sequential Data Streams |
151 |
Copyright Protection in Digital Multimedia |
174 |
Trust as a Standard for e-Commerce Infrastructure |
177 |
A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network |
180 |
Secure Data Aggregation in Wireless Sensor Networks using Privacy Homomorphism |
187 |
Deniable Encryption in Replacement of Untappable Channel to Prevent Coercion |
189 |
Traffic Signal Control for Isolated Intersections Based on Fuzzy Neural Network and Genetic Algorithm |
191 |
Author Identification in e-mail Forensic through Service Oriented Architecture |
192 |
Ad Hoc Routing for Bluetooth Using Epidemic Algorithm |
196 |
A Chaos Based Approach for improving Non linearity in S Box Design of Symmetric Key Cryptosystems |
197 |
Implementation of Invisible Digital Watermarking by Embedding Data in Arithmetically Compressed Form into Image using Variable-Length Key |
201 |
Energy efficient key management for mobile heterogeneous sensor networks |
206 |
Deployable Low Cost Outdoor Aerial Surveillance System
|
208 |
Low-cost Autonomous Ground Vehicle for Low Intensity Military Conflict |
214 |
A Proposed method for increase Security in SCADA systems |
All Rights Reserved © AIRCC
