default search action
International Journal of Information and Computer Security, Volume 4
Volume 4, Number 1, 2010
- Che Wun Chiou, Fu-Hua Chou, Yun-Chi Yeh:
Speeding up Euclid's GCD algorithm with no magnitude comparisons. 1-8 - Shiyan Hu:
A secure partition-based document image watermarking scheme. 9-23 - Amit K. Awasthi:
Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection. 24-29 - Ping Wang, Lei Wu, Ryan Cunningham, Cliff C. Zou:
Honeypot detection in advanced botnet attacks. 30-51 - Li Qin, Vijayalakshmi Atluri:
Semantics-aware security policy specification for the semantic web data. 52-75 - Zhanshan (Sam) Ma:
An integrated approach to network intrusion detection with block clustering analysis, generalised logistic regression and linear discriminant analysis. 76-97
Volume 4, Number 2, 2010
- Philip Woodall, Pearl Brereton:
A systematic literature review of inference strategies. 99-117 - Vijayalakshmi Atluri, Qi Guo, Heechang Shin, Jaideep Vaidya:
A unified index structure for efficient enforcement of spatiotemporal authorisations. 118-151 - Defa Hu, Qiaoliang Li:
Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer. 152-163 - Abdelrahman Desoky:
Comprehensive linguistic steganography survey. 164-197
Volume 4, Number 3, 2011
- P. Karthigaikumar, K. Baskaran, K. Jaraline Kirubavathy:
Low power implementation of audio watermarking using chirp spread spectrum technique. 199-214 - Jing Jin, Gail-Joon Ahn:
Assured resource sharing in Grid environments. 215-233 - Abdelrahman Desoky:
Sumstega: summarisation-based steganography methodology. 234-263 - Oladayo Olufemi Olakanmi:
RC42's innovative way for data security in wireless data communication. 264-275 - Zhanshan (Sam) Ma:
Frailty modelling for risk analysis in network security and survivability. 276-294
Volume 4, Number 4, 2011
- Julian L. Rrushi:
Anomaly detection via statistical learning in industrial communication networks. 295-315 - Defa Hu, Juanjuan Luo:
Digital fingerprinting: problems and solutions. 316-331 - Mahmood Al-khassaweneh:
Image encryption method based on using least square error techniques at the decryption stage. 332-344 - Adesina S. Sodiya, Adenrele Afolorunso, Omoniyi Paul Ogunderu:
A countermeasure algorithm for password guessing attacks. 345-364 - Khaled Gaaloul, Henderik Alex Proper, Ehtesham Zahoor, François Charoy, Claude Godart:
A logical framework for reasoning about delegation policies in workflow management systems. 365-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.