International Journal of Advanced Intelligence Paradigms (IJAIP)

International Journal of Advanced Intelligence Paradigms

2019 Vol.13 No.1/2

Special Issue on: New Trends for Security in Network Analytics And Internet of Things

Guest Editors: Gulshan Shrivastava, Prabhat Kumar and Manju Khari

Editorial

Pages Title and author(s)
8-14A novel encryption compression scheme using Julia sets
Bhagwati Prasad; Kunti Mishra
DOI: 10.1504/IJAIP.2019.099940
15-31Perplexed Bayes classifier-based secure and intelligent approach for aspect level sentiment analysis
Sumit Kumar Yadav; Devendra K. Tayal; Shiv Naresh Shivhare
DOI: 10.1504/IJAIP.2019.099941
32-42An efficient crypto-compression scheme for medical images by selective encryption using DCT
Med Karim Abdmouleh; Hedi Amri; Ali Khalfallah; Med Salim Bouhlel
DOI: 10.1504/IJAIP.2019.099942
43-66Hybrid approach to enhance contrast of image for forensic investigation using segmented histogram
Sachin Dube; Kavita Sharma
DOI: 10.1504/IJAIP.2019.099943
67-79Use of 'A light weight secure image encryption scheme based on chaos and DNA computing' for encrypted audio watermarking
Bhaskar Mondal; Tarni Mandal; Tanupriya Choudhury; Danish Ali Khan
DOI: 10.1504/IJAIP.2019.099944
80-100Malware intelligence: beyond malware analysis
Ekta Gandotra; Divya Bansal; Sanjeev Sofat
DOI: 10.1504/IJAIP.2019.099945
101-112Trust evaluation of websites: a comprehensive study
Himani Bansal; Shruti Kohli
DOI: 10.1504/IJAIP.2019.099946
113-129An epidemic model for security and performance of wireless sensor networks
Rudra Pratap Ojha; Kavita Sharma; Pramod Kumar Srivastava; Goutam Sanyal
DOI: 10.1504/IJAIP.2019.099947
130-154Secure handoff technique with reduced authentication delay in wireless mesh network
Geetanjali Rathee; Hemraj Saini
DOI: 10.1504/IJAIP.2019.099948
155-177A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases
K. Srinivasa Reddy; S. Ramachandram
DOI: 10.1504/IJAIP.2019.099949
178-192Security model against worms attack in wireless sensor network
Rudra Pratap Ojha; Pramod Kumar Srivastava; Goutam Sanyal
DOI: 10.1504/IJAIP.2019.099950
193-209Untraceable privacy-preserving authentication protocol for RFID tag using salted hash algorithm
Pinaki Ghosh; T.R. Mahesh
DOI: 10.1504/IJAIP.2019.099951
210-229Comparison of different RSA variants
Seema Verma; Manoj Kumar
DOI: 10.1504/IJAIP.2019.099952
230-259GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks
Deepika Kukreja; Deepak Kumar Sharma; S.K. Dhurandher; B.V.R. Reddy
DOI: 10.1504/IJAIP.2019.099953