Analysis of Elementary Cellular Automata Chaotic Rules Behavior K. Salman, Middle Tennessee State University, U.S.A
A Novel Service Oriented Architecture (SOA) to Secure Services in E-City Sajjad Hashemi1, Seyyed Yasser Hashemi1 and Khalil Monfaredi2, 1Islamic Azad University, Iran and 2Azarbaijan Shahid Madani University, Iran
Cloud Computing Technology: Security and Trust Challenges Sajjad Hashemi, Islamic Azad University, Iran
Security System with Face Recognition, Sms Alert and Embedded Network Video Monitoring Terminal J. Shankar Kartik, K. Ram Kumar and V.S. Srimadhavan, SRM Easwari Engineering College, India
A Novel Multifactor Authentication System Ensuring Usability and Security Gloriya Mathew and Shiney Thomas, Amal Jyothi College of Engineerng, India
Malicious Pdf Document Detection Based on Feature Extraction and Entropy Himanshu Pareek, Center for Development of Advanced Computing, India
Data Storage Security Challenges in Cloud Computing Sajjad Hashemi, Islamic Azad University, Iran
YourPrivacyProtector: A Recommender System for Privacy Settings in Social Networks Kambiz Ghazinour1,2, Stan Matwin1,2,4 and Marina Sokolova1,2,3, 1School of Electrical Engineering and Computer Science University of Ottawa, 2CHEO Research Institute, Canada, 3University of Ottawa, Canada and 4Dalhousie University, Canada
Performance Evaluation of Message Security Using Fractal Sieve with MMD Ch. Rupa, Vasireddy Venkatadri Institute of Technology, India
A Smart Wizard System Suitable for Use With Internet Mobile Devices to Adjust Personal Information Privacy Settings
Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET Bhuvaneshwari .k and A. Francis Saviour Devaraj, Oxford College of Engineering, India
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET Vandana C.P and A. Francis Saviour Devaraj, Oxford College of Engineering, India
Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia
Managing the Intertwining Among Users, Roles, Permissions, and User Relationships in an Information Flow Control Model Shih-Chien Chou, National Dong Hwa University, Hualien, Taiwan
An Evaluation of Energy Efficient Source Authentication Methods for False Data Filtering in WSN Syama M and Deepti C, The Oxford College of Engineering, India
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service Ramya Shivanagu and Deepti C, The Oxford College of Engineering, India
Design and Development of an Ultrasonic Motion Detector Adamu Murtala Zungeru, University of Nottingham, Malaysia
Automated Control for Risk Assessment on Unix Operating System - I Prashant Kumar Patra1 & Padma Lochan Pradhan2, 1College of Engineering & Technology, BPUT,India and 2Sikha 'O' Anusandhan University, India
An electronic digital combination lock: a Precise and reliable security system Adamu Murtala Zungeru, University of Nottingham, Malaysia
An Approach for Broader Range of Security in Cloud Computing R.Bala chandar, M.S.Kavitha and K.Seenivasan, Sri Shakthi Institute of Engineering and Technology, India