Journal cover image

Browse issues

Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Internet Technology and Secured Transactions

2012 Vol. 4 No. 2/3


PagesTitle and authors
105-120Path management method for large-scale MPLS networks from viewpoint of operational cost factors
Motoi Iwashita; Masayuki Tsujino
DOI: 10.1504/IJITST.2012.047963

121-138A comparative study of attributes for gathering admissible evidence in the investigation of distributed denial of service (DDoS) attacks
Joshua Ojo Nehinbe
DOI: 10.1504/IJITST.2012.047958

139-161A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility
Sarmad Ullah Khan; Claudio Pastrone; Luciano Lavagno; Maurizio A. Spirito
DOI: 10.1504/IJITST.2012.047959

162-177A novel methodology for data hiding in Microsoft Word file
Rajesh Kumar Tiwari; G. Sahoo
DOI: 10.1504/IJITST.2012.047960

198-206A vulnerability evaluation framework for online social network profiles: axioms and propositions
Sophia Alim; Daniel Neagu; Mick Ridley
DOI: 10.1504/IJITST.2012.047961

207-220Mutually exclusive permissions in RBAC
Muhammad Asif Habib; Qaisar Abbas
DOI: 10.1504/IJITST.2012.047962

221-236Developing secure web applications
Dharmendra Choukse; Dimitris N. Kanellopoulos; Umesh Kumar Singh
DOI: 10.1504/IJITST.2012.047969

237-251Feasibility of position-based multivariate cryptosystems for WSN
Pradheepkumar Singaravelu; Shekhar Verma; Charles A. Shoniregun
DOI: 10.1504/IJITST.2012.047967