International Journal of Computer Science and Security (IJCSS)

Displaying 1-36 of 36 results

  • White Papers // Jun 2013

    A Crypto-System with Embedded Error Control for Secure and Reliable Communication

    In this paper the authors propose a novel Crypto-System with Embedded Error Control (CSEEC). The system supports data security and reliability using Forward Error correction Codes (FEC). Security is provided through the use of a new symmetric encryption algorithm, while reliability is provided through the support of FEC codes. The...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2013

    The Impact of Customer Knowledge on the Security of E-Banking

    In this paper one of the most affective factors on security of e-banking will be discussed, by accepting the use of information technology for the execution of the traditional e-banking, As the authors know that e-banking is done online and the customers are considered the active element and the other...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2013

    Security Aspects of the Information Centric Networks Model

    With development of internet and the enormous growth of contents over networks, that motivated the researchers to proposed new paradigm model called Information Centric Networks (ICN), the most features of ICN model is based on the content itself, instead, of the server located the contents over internet. This new model...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Mar 2013

    Cost Benefits of Cloud vs. In-house IT for Higher Education

    Cloud computing is an excellent alternative for higher education in a resource limited setting. Universities should take advantage of available cloud-based application offered by service providers and enable their own user/student to perform business and academic tasks. In this paper, the authors will compare the cost between on-premise options and...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jan 2013

    Design and Implementation of Meetings Document Management and Retrieval System

    Meetings management system has components to capture, storing/archiving, retrieve, browse, and distribute documents from the system and security to protect documents from unauthorized access. Lack of proper organization, storage and easy access of meeting documents, bottleneck of keeping paper documents, slow distribution, and misplacement of documents necessitated the need for...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Oct 2012

    Analysis of N Category Privacy Models

    File sharing becomes popular in social networking and the disclosure of private information without user's consent can be found easily. Password management becomes increasingly necessary for maintaining privacy policy. Monitoring of violations of a privacy policy is needed to support the confidentiality of information security. This paper extends the analysis...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Oct 2012

    Data Mining and Visualization of Large Databases

    Data mining and visualization are tools that are used in databases to further analyze and understand the stored data. Data mining and visualization are knowledge discovery tools used to find hidden patterns and to visualize the data distribution. In the paper, the authors shall illustrate how data mining and visualization...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Oct 2012

    Analysis of the Iriscodes Bioencoding Scheme

    Biometric schemes are widely used for identification and authentication. Nevertheless, biometric techniques give rise to many security and privacy concerns, especially because biometric data cannot be revoked. The protection of these sensitive data is a major requirement for the deployment of biometric schemes. Cancelable biometrics is based on a randomized...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Aug 2012

    Using Geographical Location as an Authentication Factor to Enhance mCommerce Applications on Smartphones

    Smartphones are increasingly used to perform mCommerce applications whilst on the move. 50% of all Smartphone owners in the U.S. used their Smartphone for banking transactions in the first quarter of 2011. This is an increase of nearly 100% compared to the year before. Current techniques used to remotely authenticate...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Aug 2012

    Software Design Level Vulnerability Classification Model

    Classification of software security vulnerability no doubt facilitates the understanding of security related information and accelerates vulnerability analysis. The lack of proper classification not only hinders its understanding but also renders the strategy of developing mitigation mechanism for clustered vulnerabilities. Now software developers and researchers are agreed on the fact...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2012

    Performance Evaluation of Mini-Sinks Mobility Using Multiple Paths in Wireless Sensor Networks

    This paper presents a new approach based on the use of many data collectors, which the authors designate Mini-Sinks (MSs), instead of a single sink to collect the data in order to improve Wireless Sensor Network (WSN) performance. One or mode MS are mobile and move according to a controlled...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2012

    Mining Regular Patterns in Data Streams Using Vertical Format

    The increasing prominence of data streams has been lead to the study of online mining in order to capture interesting trends, patterns and exceptions. Recently, temporal regularity in occurrence behavior of a pattern was treated as an emerging area in several online applications like network traffic, sensor networks, e-business and...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Feb 2012

    Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

    Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker (Phisher). Attempts to stop phishing by preventing a user from interacting with a malicious web site have shown to be ineffective. In this...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Feb 2012

    Using Cipher Key to Generate Dynamic S-Box in AES Cipher System

    The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. The S-Box component that used in AES is fixed, and not changeable. If the authors can generate this S-Box dynamically, they increase the cryptographic strength of AES cipher system....

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Feb 2012

    Semantic Massage Addressing Based on Social Cloud Actor's Interests

    Wireless communication with mobile terminals has become popular tools for collecting and sending information and data. With mobile communication comes the Short Message Service (SMS) technology which is an ideal way to stay connected with anyone, anywhere anytime to help maintain business relationships with customers. Sending individual SMS messages to...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Feb 2012

    New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this paper, the authors introduce an efficient distributed clustering layer algorithm...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Dec 2011

    Detection of Botnets Using Honeypots and P2P Botnets

    A \"Botnet\" is a group of compromised computers connected to a network, which can be used for both recognition and illicit financial gain, and it is controlled by an attacker (bot-herder). One of the counter measures proposed in recent developments is the \"Honeypot\". The attacker, who would be aware of...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Dec 2011

    Phishing Website Detection and Optimization Using Particle Swarm Optimization Technique

    Fake websites is the process of attracting people to visit fraudulent websites and making them to enter confidential data like credit-card numbers, usernames and passwords. The authors present a novel approach to overcome the difficulty and complexity in detecting and predicting fake website. There is an efficient model which is...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Dec 2011

    A Distributed Approach to Defend Web Service from DDoS Attacks

    Most of the business applications on the internet are dependent on web services for their transactions. Distributed Denial of Service (DDoS) attacks either degrade or completely disrupt web services by sending flood of packets and requests towards the victim web servers. An array of defense schemes are proposed but still...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Nov 2011

    A Novel Steganography Technique that Embeds Security Along with Compression

    Problem faced by today's communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using steganography. Firstly, the focus...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Aug 2011

    Information Security Maturity Model

    To ensure security, it is important to build-in security in both the planning and the design phases and adapts a security architecture which makes sure that regular and security related tasks, are deployed correctly. Security requirements must be linked to the business goals. The authors identified four domains that affect...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jul 2011

    Survey Paper: Cryptography is the Science of Information Security

    Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Now-a-days, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    Phishing: A Field Experiment

    Phishing is a method that hackers use to fraudulently acquire sensitive or private information from a victim by impersonating a real entity. Phishing can be defined as the act of soliciting or stealing sensitive information such as usernames, passwords, bank account numbers, credit card numbers, and social security or citizen...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    A Study of Protocols for Grid Computing Environment

    Using grid systems efficiently has to face many challenges. One of them is the efficient exchange of data between distant components exacerbated by the diversity of existing protocols for communicating participants. Grid computing will reach its vast potential if and only if, the underlying networking infrastructure is able to transfer...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    Three Dimensional Database: Artificial Intelligence to eCommerce Web Service Agents

    In this paper the authors using artificial intelligence technique to web service agents and increase the efficiency of the agent communications. In recent years, web services have played a major role in computer applications. Web services are essential, as the design model of applications are dedicated to electronic businesses. This...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    Radical Data Compression Algorithm Using Factorization

    In this paper the authors deal with encoding algorithm that conveys a message that generates a \"Compressed\" form with fewer characters only understood through decoding the encoded data which reconstructs the original message. The proposed factorization techniques in conjunction with lossless method were adopted in compression and decompression of data...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    Cryptographic Algorithms for Secure Data Communication

    Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper the authors present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    A New Function-Based Framework for Classification and Evaluation of Mutual Exclusion Algorithms in Distributed Systems

    The mutual exclusion problem involves the allocation of a single, non shareable resource among n processes, by means that just one process can execute in its critical section at a given time. This paper presents a new function-based framework for mutual exclusion algorithms in distributed systems. In the traditional classification...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    J48 and JRIP Rules for E-Governance Data

    Data are any facts, numbers, or text that can be processed by a computer. Data mining is an analytic process which designed to explore data usually large amounts of data. Data mining is often considered to be a blend of statistics. In this paper the authors have used two data...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service

    Driven by business needs and the availability of the latest web services technology, the authors have seen increasing reliance on services provided over the web. Many web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a web-services...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    Security Model for Hierarchical Clustered Wireless Sensor Networks

    The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that 'To design a completely secure WSN, security must be integrated into every node of the system'. This paper discusses on two main components of the security framework viz. the secure key...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    Information Technology (IT) Security Framework for Kenyan Small and Medium Enterprises (SMEs)

    To address challenges faced by SMEs especially in Kenya, this paper aims to establish an Information Technology (IT) framework that can allow Kenyan Small and Medium Enterprises (SMEs) implement cost effective security measures. Particularly this paper discusses IT security requirements and appropriate metrics. There is evidence from the survey to...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings

    In a multi-proxy signature scheme, an original signer delegates the user signing power to a group of proxy signers. Then the group of proxy signers cooperatively generates a multi-proxy signature on behalf of the original signer; and any one can verify the validity of the multi-proxy signature. But, when the...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    Secure E-Commerce Protocol

    E-commerce has presented a new way of doing business all over the world using internet. Organizations have changed their way of doing business from a traditional approach to embrace e-commerce processes. As individuals and businesses increase information sharing, a concern regarding the exchange of money securely and conveniently over the...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    Authentication and Authorization Models

    In computer science distributed systems could be more secured with a distributed trust model based on either PKI or kerberos. However, it becomes difficult to establish trust relationship across heterogeneous domains due to different actual trust mechanism and security policy as well as the intrinsic flaw of each trust model....

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Dec 2010

    Automated Detection System for SQL Injection Attack

    Many software systems have evolved as web-based t that makes them available to the public via the internet and can expose them to a variety of web-based attacks. One of these attacks is SQL Injection Vulnerability (SQLIV), which can give attackers unrestricted access to the databases that underlie web applications...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    Information Technology (IT) Security Framework for Kenyan Small and Medium Enterprises (SMEs)

    To address challenges faced by SMEs especially in Kenya, this paper aims to establish an Information Technology (IT) framework that can allow Kenyan Small and Medium Enterprises (SMEs) implement cost effective security measures. Particularly this paper discusses IT security requirements and appropriate metrics. There is evidence from the survey to...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2012

    Performance Evaluation of Mini-Sinks Mobility Using Multiple Paths in Wireless Sensor Networks

    This paper presents a new approach based on the use of many data collectors, which the authors designate Mini-Sinks (MSs), instead of a single sink to collect the data in order to improve Wireless Sensor Network (WSN) performance. One or mode MS are mobile and move according to a controlled...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    Three Dimensional Database: Artificial Intelligence to eCommerce Web Service Agents

    In this paper the authors using artificial intelligence technique to web service agents and increase the efficiency of the agent communications. In recent years, web services have played a major role in computer applications. Web services are essential, as the design model of applications are dedicated to electronic businesses. This...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jul 2011

    Survey Paper: Cryptography is the Science of Information Security

    Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Now-a-days, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Dec 2011

    A Distributed Approach to Defend Web Service from DDoS Attacks

    Most of the business applications on the internet are dependent on web services for their transactions. Distributed Denial of Service (DDoS) attacks either degrade or completely disrupt web services by sending flood of packets and requests towards the victim web servers. An array of defense schemes are proposed but still...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Dec 2011

    Phishing Website Detection and Optimization Using Particle Swarm Optimization Technique

    Fake websites is the process of attracting people to visit fraudulent websites and making them to enter confidential data like credit-card numbers, usernames and passwords. The authors present a novel approach to overcome the difficulty and complexity in detecting and predicting fake website. There is an efficient model which is...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Dec 2011

    Detection of Botnets Using Honeypots and P2P Botnets

    A \"Botnet\" is a group of compromised computers connected to a network, which can be used for both recognition and illicit financial gain, and it is controlled by an attacker (bot-herder). One of the counter measures proposed in recent developments is the \"Honeypot\". The attacker, who would be aware of...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings

    In a multi-proxy signature scheme, an original signer delegates the user signing power to a group of proxy signers. Then the group of proxy signers cooperatively generates a multi-proxy signature on behalf of the original signer; and any one can verify the validity of the multi-proxy signature. But, when the...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    Secure E-Commerce Protocol

    E-commerce has presented a new way of doing business all over the world using internet. Organizations have changed their way of doing business from a traditional approach to embrace e-commerce processes. As individuals and businesses increase information sharing, a concern regarding the exchange of money securely and conveniently over the...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    Authentication and Authorization Models

    In computer science distributed systems could be more secured with a distributed trust model based on either PKI or kerberos. However, it becomes difficult to establish trust relationship across heterogeneous domains due to different actual trust mechanism and security policy as well as the intrinsic flaw of each trust model....

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2011

    Security Model for Hierarchical Clustered Wireless Sensor Networks

    The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that 'To design a completely secure WSN, security must be integrated into every node of the system'. This paper discusses on two main components of the security framework viz. the secure key...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    A Study of Protocols for Grid Computing Environment

    Using grid systems efficiently has to face many challenges. One of them is the efficient exchange of data between distant components exacerbated by the diversity of existing protocols for communicating participants. Grid computing will reach its vast potential if and only if, the underlying networking infrastructure is able to transfer...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    Phishing: A Field Experiment

    Phishing is a method that hackers use to fraudulently acquire sensitive or private information from a victim by impersonating a real entity. Phishing can be defined as the act of soliciting or stealing sensitive information such as usernames, passwords, bank account numbers, credit card numbers, and social security or citizen...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    Radical Data Compression Algorithm Using Factorization

    In this paper the authors deal with encoding algorithm that conveys a message that generates a \"Compressed\" form with fewer characters only understood through decoding the encoded data which reconstructs the original message. The proposed factorization techniques in conjunction with lossless method were adopted in compression and decompression of data...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    Cryptographic Algorithms for Secure Data Communication

    Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper the authors present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2013

    A Crypto-System with Embedded Error Control for Secure and Reliable Communication

    In this paper the authors propose a novel Crypto-System with Embedded Error Control (CSEEC). The system supports data security and reliability using Forward Error correction Codes (FEC). Security is provided through the use of a new symmetric encryption algorithm, while reliability is provided through the support of FEC codes. The...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2013

    The Impact of Customer Knowledge on the Security of E-Banking

    In this paper one of the most affective factors on security of e-banking will be discussed, by accepting the use of information technology for the execution of the traditional e-banking, As the authors know that e-banking is done online and the customers are considered the active element and the other...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2013

    Security Aspects of the Information Centric Networks Model

    With development of internet and the enormous growth of contents over networks, that motivated the researchers to proposed new paradigm model called Information Centric Networks (ICN), the most features of ICN model is based on the content itself, instead, of the server located the contents over internet. This new model...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jan 2013

    Design and Implementation of Meetings Document Management and Retrieval System

    Meetings management system has components to capture, storing/archiving, retrieve, browse, and distribute documents from the system and security to protect documents from unauthorized access. Lack of proper organization, storage and easy access of meeting documents, bottleneck of keeping paper documents, slow distribution, and misplacement of documents necessitated the need for...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Mar 2013

    Cost Benefits of Cloud vs. In-house IT for Higher Education

    Cloud computing is an excellent alternative for higher education in a resource limited setting. Universities should take advantage of available cloud-based application offered by service providers and enable their own user/student to perform business and academic tasks. In this paper, the authors will compare the cost between on-premise options and...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Oct 2012

    Analysis of N Category Privacy Models

    File sharing becomes popular in social networking and the disclosure of private information without user's consent can be found easily. Password management becomes increasingly necessary for maintaining privacy policy. Monitoring of violations of a privacy policy is needed to support the confidentiality of information security. This paper extends the analysis...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Oct 2012

    Data Mining and Visualization of Large Databases

    Data mining and visualization are tools that are used in databases to further analyze and understand the stored data. Data mining and visualization are knowledge discovery tools used to find hidden patterns and to visualize the data distribution. In the paper, the authors shall illustrate how data mining and visualization...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Aug 2012

    Using Geographical Location as an Authentication Factor to Enhance mCommerce Applications on Smartphones

    Smartphones are increasingly used to perform mCommerce applications whilst on the move. 50% of all Smartphone owners in the U.S. used their Smartphone for banking transactions in the first quarter of 2011. This is an increase of nearly 100% compared to the year before. Current techniques used to remotely authenticate...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Aug 2012

    Software Design Level Vulnerability Classification Model

    Classification of software security vulnerability no doubt facilitates the understanding of security related information and accelerates vulnerability analysis. The lack of proper classification not only hinders its understanding but also renders the strategy of developing mitigation mechanism for clustered vulnerabilities. Now software developers and researchers are agreed on the fact...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Feb 2012

    Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

    Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker (Phisher). Attempts to stop phishing by preventing a user from interacting with a malicious web site have shown to be ineffective. In this...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Apr 2012

    Mining Regular Patterns in Data Streams Using Vertical Format

    The increasing prominence of data streams has been lead to the study of online mining in order to capture interesting trends, patterns and exceptions. Recently, temporal regularity in occurrence behavior of a pattern was treated as an emerging area in several online applications like network traffic, sensor networks, e-business and...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Feb 2012

    Semantic Massage Addressing Based on Social Cloud Actor's Interests

    Wireless communication with mobile terminals has become popular tools for collecting and sending information and data. With mobile communication comes the Short Message Service (SMS) technology which is an ideal way to stay connected with anyone, anywhere anytime to help maintain business relationships with customers. Sending individual SMS messages to...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Feb 2012

    Using Cipher Key to Generate Dynamic S-Box in AES Cipher System

    The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. The S-Box component that used in AES is fixed, and not changeable. If the authors can generate this S-Box dynamically, they increase the cryptographic strength of AES cipher system....

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Nov 2011

    A Novel Steganography Technique that Embeds Security Along with Compression

    Problem faced by today's communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using steganography. Firstly, the focus...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Feb 2012

    New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this paper, the authors introduce an efficient distributed clustering layer algorithm...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Dec 2010

    Automated Detection System for SQL Injection Attack

    Many software systems have evolved as web-based t that makes them available to the public via the internet and can expose them to a variety of web-based attacks. One of these attacks is SQL Injection Vulnerability (SQLIV), which can give attackers unrestricted access to the databases that underlie web applications...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    A New Function-Based Framework for Classification and Evaluation of Mutual Exclusion Algorithms in Distributed Systems

    The mutual exclusion problem involves the allocation of a single, non shareable resource among n processes, by means that just one process can execute in its critical section at a given time. This paper presents a new function-based framework for mutual exclusion algorithms in distributed systems. In the traditional classification...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    J48 and JRIP Rules for E-Governance Data

    Data are any facts, numbers, or text that can be processed by a computer. Data mining is an analytic process which designed to explore data usually large amounts of data. Data mining is often considered to be a blend of statistics. In this paper the authors have used two data...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Jun 2011

    A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service

    Driven by business needs and the availability of the latest web services technology, the authors have seen increasing reliance on services provided over the web. Many web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a web-services...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Oct 2012

    Analysis of the Iriscodes Bioencoding Scheme

    Biometric schemes are widely used for identification and authentication. Nevertheless, biometric techniques give rise to many security and privacy concerns, especially because biometric data cannot be revoked. The protection of these sensitive data is a major requirement for the deployment of biometric schemes. Cancelable biometrics is based on a randomized...

    Provided By International Journal of Computer Science and Security (IJCSS)

  • White Papers // Aug 2011

    Information Security Maturity Model

    To ensure security, it is important to build-in security in both the planning and the design phases and adapts a security architecture which makes sure that regular and security related tasks, are deployed correctly. Security requirements must be linked to the business goals. The authors identified four domains that affect...

    Provided By International Journal of Computer Science and Security (IJCSS)