3Keunwoo Rhee,Woongryul Jeon,Dongho Won. Security Requirements of a Mobile Device Manage- ment System [J].Intemational Journal of Security and Its Applications, 2012,6(02) : 353-355.
4Peng Xiao, Jingsha He and Yingfang Fu. Dis- tributed Group Key Management in Wireless Mesh Networks [J].Intemational Journal of Security and Its Applications, 2012,6 ( 02 ) : 53-62.
5Namita Tiwari, Madhu Shandilya.Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An Incremental Growth [J].Intemational Journal of Security and Its Applications, 2010,4 (04) : 53-62.
6Amman-Jordan.A Novel Encryption Method for Image Security[J].intemational Joumal of Security and Its Applications, 2012,6(01 ):2-8.
8Ajit Singh, Rimple Gilhotra. Data Security Us- ing Private Key Encryption System Based on Arith- metic Coding[J].International Journal of Network Secu- rity & Its Applications (IJNSA), 2011,3 (03): 58-67.
9Angel R,Carlos E,Abrar.A Multi-Criteria E- valuation Ofinformation Security Controls Using Boolean Features [J].International Journal of Network Security & Its Applications (IJNSA),2010,2 (04): 3-11.