An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks
1Anna University Coimbatore Coimbatore, India
2Registrar, Anna University Coimbatore Coimbatore, India
Keywords: Shamir’s secret sharing, denial of Service (DoS), Routing Cum Forwarding (RCF), certificate revocation, and certification revival.
Received May 3, 2010; accepted August 10, 2010
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
1Director, Universal Institute of Engg. and Tech. Lalru, Chandigarh-India
2Reader, UCOE, Punjabi University, Patiala- India
3Prof. ,UIET, Punjab University, Chandigarh-India
Keywords: Intrusion Detection, Wireless Networks, Received Signal Strength (RSS), Cross Layer, RTS-CTS Handshake, and (TT).
Received May 20, 2010; accepted July 4, 2010
An Effective Data Warehousing System for RFID using Novel Data Cleaning, Data Transformation and Loa
An Effective Data Warehousing System for RFID using Novel Data Cleaning, Data Transformation and Loading Techniques
1Department of MCA, GNIM, New Delhi, India
2Professor, Computer Science Department, M.D.University, Rohtak
Keywords: Data warehousing system, data cleaning, data transformation, data loading, dirty data, radio frequency Identification (RFID), and suspicious tags.
Received September 29, 2009; accepted March 9, 2010
Neural Disparity Map Estimation from Stereo Image
Computer Science Department, University of Science and Technology-Houari Boumediene, Algeria
Keywords: Neural network, disparity map, segmentation, and uncalibrated cameras.
Received September 29, 2009; accepted August 10, 2010
A Novel Radon-Wavelet-based Multi-Carrier Code Division Multiple Access Transceiver Design and Simul
A Novel Radon-Wavelet-based Multi-Carrier Code Division Multiple Access Transceiver Design and Simulation under Different Channel Conditions
EE Engineering Department, Tafila Technical University, Jordan
Keywords: Finite radon transform, DWT, radon-wavelet based OFDM, multiwavelet based MC-CDMA, radon based MC-CDMA and FFT based MC-CDMA.
Received August 5, 2009; accepted October 10, 2010
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
Faculty of Information Technology, Isra University, Jordan
Keywords: Data integrity, tampering, remote systems, trustworthiness, and survivability.
Received October 12, 2009; accepted March 9, 2010
Comparison of Genetic Algorithm and Quantum Genetic Algorithm
SCAL group, MISC Laboratory, University Mentouri, Constantine, Algeria.
Keywords: Genetic algorithm, knapsack problem, quantum genetic algorithm, and quantum computing.
Received October 18, 2009; accepted May 20, 2010
A Hybrid Approach for Urdu Sentence Boundary Disambiguation
Department of Computer Science, COMSATS Institute of IT, Pakistan
Keywords: Sentence boundary disambiguation, and unigram model.
Received October 19, 2009; accepted May 20, 2010
Facile Programming
Computers and Systems Department, Electronics Research Institute, Egypt
Keywords: Programming languages, Arabic programming, SQL, and Arabic SQL.
Received November 22, 2009; accepted March 9, 2010
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
1Lecturer, Department of ECE PSG College of Technology, Coimbatore
2Principal Muthayammal Engineering College, Rasipuram
Keywords: Data integrity, hash algorithm, digital signature, pre-image, message digest, and message authentication.
Received September 29, 2009; accepted August 10, 2010
Representing Access Control Policies in Use Cases
College of Computer and Information Sciences, Center of Excellence Information Assurance, King Saud University, Saudi Arabia
Keywords: Access control policies, security engineering, use cases, misuse.
Received December 14, 2009; accepted May 21, 2010
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
1 Department of Information Management, Chinese Culture University, Taiwan
2 Department of Information Management, Ming Chuan University, Taiwan (correspondence author)
Keywords: joint ownership protection, visual cryptography, discrete cosine transform.
Received January 2, 2010; accepted October 24, 2010
An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Application
An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications
1Computer Engineering Department, Jordan University of Science and Technology, Jordan
2Electrical and Computer Engineering Department, the University of Arizona, USA
3Engineering Mathematics and Internetworking Department, Dalhousie University, Canada
Keywords: Cryptography, number theory, finite field arithmetic, hardware design, and radix-4.
Received January 1, 2010; accepted August 10, 2010