International Journal of Internet Technology and Secured Transactions (IJITST)

International Journal of Internet Technology and Secured Transactions

2012 Vol.4 No.2/3


Pages Title and author(s)
105-120Path management method for large-scale MPLS networks from viewpoint of operational cost factors
Motoi Iwashita; Masayuki Tsujino
DOI: 10.1504/IJITST.2012.047963
121-138A comparative study of attributes for gathering admissible evidence in the investigation of distributed denial of service (DDoS) attacks
Joshua Ojo Nehinbe
DOI: 10.1504/IJITST.2012.047958
139-161A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility
Sarmad Ullah Khan; Claudio Pastrone; Luciano Lavagno; Maurizio A. Spirito
DOI: 10.1504/IJITST.2012.047959
162-177A novel methodology for data hiding in Microsoft Word file
Rajesh Kumar Tiwari; G. Sahoo
DOI: 10.1504/IJITST.2012.047960
198-206A vulnerability evaluation framework for online social network profiles: axioms and propositions
Sophia Alim; Daniel Neagu; Mick Ridley
DOI: 10.1504/IJITST.2012.047961
207-220Mutually exclusive permissions in RBAC
Muhammad Asif Habib; Qaisar Abbas
DOI: 10.1504/IJITST.2012.047962
221-236Developing secure web applications
Dharmendra Choukse; Dimitris N. Kanellopoulos; Umesh Kumar Singh
DOI: 10.1504/IJITST.2012.047969
237-251Feasibility of position-based multivariate cryptosystems for WSN
Pradheepkumar Singaravelu; Shekhar Verma; Charles A. Shoniregun
DOI: 10.1504/IJITST.2012.047967