Vol. 1, No. 1, 2013
Contents
- Cover Page
- Inside Cover Page
- Editorial Board
- Foreword and Editorial
- Table of Contents
- Embedding Data in DNA Sequence for Security
Volume 1, No. 1, 2013, 6 pages,
DOI: http://dx.doi.org/10.21742/ijria.2013.1.1.01
Authors: Jia Chen, Debnath Bhattacharyya and Samir Kumar Bandyopadhyay
- Thwarting Address Resolution Protocol Poisoning using Man In The Middle Attack in WLAN
Volume 1, No. 1, 2013, 12 pages,
DOI: http://dx.doi.org/10.21742/ijria.2013.1.1.02
Authors: Dong Hyun Youm, Rajneesh Kumar, Shekhar Verma and Geetam Singh Tomar
- CSRF Attack using Two fish Security Approach
Volume 1, No. 1, 2013, 10 pages,
DOI: http://dx.doi.org/10.21742/ijria.2013.1.1.03
Authors: Ye-lin Ahn, Yang Shanshan, Sk.Apsaruneesa1 and Sk.Wasimakram
- Unique Data Integrity in Public Cloud
Volume 1, No. 1, 2013, 8 pages,
DOI: http://dx.doi.org/10.21742/ijria.2013.1.1.04
Authors: Ford Lumban Gaol, Chi Hao and Pasupuleti Veeramma,
- Copyright