International Journal of Computer Science & Information Security

International Journal of Computer Science & Information Security

IJCSIS Vol. 12 No. 7, July 2014 ISSN 1947-5500 International Journal of Computer Science & Information Security © IJCSIS PUBLICATION 2014 JCSI I S ISSN (online): 1947-5500 Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results. CALL FOR PAPERS International Journal of Computer Science and Information Security (IJCSIS) January-December 2014 Issues The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. See authors guide for manuscript preparation and submission guidelines. Indexed by Google Scholar, DBLP, CiteSeerX, Directory for Open Access Journal (DOAJ), Bielefeld Academic Search Engine (BASE), SCIRUS, Scopus Database, Cornell University Library, ScientificCommons, ProQuest, EBSCO and more. Deadline: see web site Notification: see web site Revision: see web site Publication: see web site Context-aware systems Agent-based systems Networking technologies Mobility and multimedia systems Security in network, systems, and applications Systems performance Evolutionary computation Networking and telecommunications Industrial systems Software development and deployment Evolutionary computation Knowledge virtualization Autonomic and autonomous systems Systems and networks on the chip Bio-technologies Knowledge for global defense Knowledge data systems Information Systems [IS] Mobile and distance education IPv6 Today - Technology and deployment Intelligent techniques, logics and systems Modeling Knowledge processing Software Engineering Information technologies Optimization Internet and web technologies Complexity Digital information processing Natural Language Processing Cognitive science and knowledge Speech Synthesis Data Mining For more topics, please see web site https://sites.google.com/site/ijcsis/ For more information, please visit the journal website (https://sites.google.com/site/ijcsis/) Editorial Message from Managing Editor The International Journal of Computer Science and Information Security (IJCSIS) presents research, review and survey papers which offer a significant contribution to the computer science knowledge, and which are of high interest to a wide academic/research/practitioner audience. Coverage extends to all main-stream and state of the art branches of computer science, security and related information technology applications. As a scholarly open access peer-reviewed journal, IJCSIS mission is to provide an outlet for quality research publications. It aims to promote universal access with equal opportunities for international scientific community; to scientific knowledge, and the creation, and dissemination of scientific and technical information. IJCSIS archives all publications in major academic/scientific databases. Indexed by the following International agencies and institutions: Google Scholar, Bielefeld Academic Search Engine (BASE), CiteSeerX, SCIRUS, Cornell’s University Library EI, Scopus, DBLP, DOI, ProQuest, EBSCO. Google Scholar reported increased in number cited papers published in IJCSIS (No. of Cited Papers:520, No. of Citations:981, Years:5). Abstracting/indexing, editorial board and other important information are available online on homepage. This journal supports the Open Access policy of distribution of published manuscripts, ensuring "free availability on the public Internet, permitting any users to read, download, copy, distribute, print, search, or link to the full texts of [published] articles". IJCSIS editorial board, consisting of international experts, ensures a rigorous peer-reviewing process. We look forward to your collaboration. For further questions please do not hesitate to contact us at [email protected]. , A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 12, No. 7, July 2014 Edition ISSN 1947-5500 © IJCSIS, USA. Journal Indexed by (among others): IJCSIS EDITORIAL BOARD Dr. Yong Li School of Electronic and Information Engineering, Beijing Jiaotong University, P. R. China Prof. Hamid Reza Naji Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Dr. Sanjay Jasola Professor and Dean, School of Information and Communication Technology, Gautam Buddha University Dr Riktesh Srivastava Assistant Professor, Information Systems, Skyline University College, University City of Sharjah, Sharjah, PO 1797, UAE Dr. Siddhivinayak Kulkarni University of Ballarat, Ballarat, Victoria, Australia Professor (Dr) Mokhtar Beldjehem Sainte-Anne University, Halifax, NS, Canada Dr. Alex Pappachen James (Research Fellow) Queensland Micro-nanotechnology center, Griffith University, Australia Dr. T. C. Manjunath HKBK College of Engg., Bangalore, India. Prof. Elboukhari Mohamed Department of Computer Science, University Mohammed First, Oujda, Morocco TABLE OF CONTENTS 1. Paper 30061401: Logical Analysis of an Accelerated Secure Multicast Authentication Protocol (pp. 1-10) Full Text: PDF Ghada Elkabbany, Informatics Dept., Electronics Research Institute, Cairo, Egypt Mohamed Rasslan, Informatics Dept., Electronics Research Institute, Cairo, Egypt Heba Aslan, Informatics Dept., Electronics Research Institute, Cairo, Egypt Abstract — Multicast authentication is a challenging problem, because it should verify the received packets without assuming the availability of the entire original stream and resist many types of attacks, such as pollution attacks. Researchers have proposed many solutions in literature with major drawbacks in high communication and computation overheads. Others suffer from packet loss and pollution attacks. Recently, signature techniques were used to provide multicast authentication. Signcryption techniques have the advantage of achieving the basic goals of encryption and signature schemes. But, it suffers from the inability to resist packet loss. In a previous work, we proposed a multicast authentication protocol that is based on signcryption techniques and erasure code function to solve the packet loss problem. In this paper, we utilize pipelining technique to reduce the computation overhead. Pipelined technique is chosen due to its suitability for signcryption algorithm nature. The pipelined technique reduces the computation time. Moreover, a verification of our protocol using BAN logic is performed. The analysis shows that it achieves the goals of authentication without bugs or redundancies. A comparison of multicast authentication protocols is carried out. The results show that the accelerated multicast authentication protocol resists packet loss and pollution attacks with low computation and communication overheads, therefore, it could be used in real-time applications. Keywords - Multicast Communication, Authentication, Signcryption, Erasure Code Functions, Parallel Pipelined, BAN Logic. 2. Paper 30061403: Image Zooming using Sinusoidal Transforms like Hartley, DFT, DCT, DST and Real Fourier Transform (pp. 11-16) Full Text: PDF Dr. H. B. Kekre, Senior Professor Computer Engineering Department MPSTME, NMIMS University, Vile Parle, Mumbai, India, Dr. Tanuja Sarode, Associate Professor, Computer Department, Thadomal Shahani Engg. College, Bandra, Mumbai 50, India Shachi Natu, Ph.D. Research Scholar, Computer Engineering Department MPSTME, NMIMS University, Vile Parle, Mumbai, India Abstract — A simple method of resizing the image using the relation between sampling frequency and zero padding in frequency and time domain or vice versa of Fourier transform is proposed. Padding zeroes in frequency domain and then taking inverse gives zooming effect to image. Transforms like Fourier transform, Real Fourier transform, Hartley transform, DCT and DST are used. Their performance is compared and Hartley is found to be giving better performance. As we increase the size of image, DCT starts giving better performance. Performance of all these transforms is also compared with another resizing technique called grid based scaling and transformed based resizing is observed to be better than grid based resizing. Keywords-Image zooming; DFT; Hartley Transform; Real Fourier Transform; DCT; DST 3. Paper 30061404: A Self-Training with Multiple CPUs Algorithm for Load Balancing using Time estimation (pp. 17-21) Full Text: PDF Aziz Alotaibi, Fahad Alswaina Department of Computer Science, 221 University Ave, University of Bridgeport, Bridgeport, CT, USA Abstract - In this paper, we propose a self-trading algorithm using two new parameters: time execution and type of priority to improve the load balancing performance. Load balancing uses information such as CPU load, memory usage, and network traffic which has been extracted from previous execution to increase the resource’s utilization. We have included time execution for each property individually such as CPU bound, and Memory bound to balance the work between nodes. Type of priority has been taken into account to enhance and expedite the processing of request with high priority. Keywords – Cloud Computing, Load Balancing, Resource allocation. 4. Paper 30061405: Result-Oriented Approach for Websites Accessibility Evaluation (pp. 22-30) Full Text: PDF Marya Butt, School of Governance, Utrecht University, Utrecht, the Netherlands Abstract — The paper attempts to devise a

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    128 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us