default search action
International Journal of Information and Computer Security, Volume 6
Volume 6, Number 1, 2014
- R. Sakthivel, M. Vanitha, Harish M. Kittur:
Low power high throughput reconfigurable stream cipher hardware VLSI architectures. 1-11 - Suvrojit Das, Debayan Chatterjee, Debidas Ghosh, Narayan C. Debnath:
Extracting the system call identifier from within VFS: a kernel stack parsing-based approach. 12-50 - P. M. Siva Raja, E. Baburaj:
Genetic algorithms based data hiding scheme for digital images with LSBMR. 51-62 - Ahmed Aleroud, George Karabatis, Prayank Sharma, Peng He:
Context and semantics for detection of cyber attacks. 63-92 - Achilleas Tsitroulis, Dimitris Lampoudis, Emmanuel Tsekleves:
Exposing WPA2 security protocol vulnerabilities. 93-107
Volume 6, Number 2, 2014
- Syed Taqi Ali, B. B. Amberker:
Attribute-based group signature without random oracles with attribute anonymity. 109-132 - Anant M. Bagade, Sanjay N. Talbar:
Secure transmission of morphed stego keys over internet using IP steganography. 133-142 - Oluwasefunmi 'Tale Arogundade, Zhi Jin, Xiaoguang Yang:
Towards ontological approach to eliciting risk-based security requirements. 143-178 - Ismahani Binti Ismail, Muhammad Nadzir Marsono, Sulaiman Mohd Nor:
Malware detection using augmented naive Bayes with domain knowledge and under presence of class noise. 179-197
Volume 6, Number 3, 2014
- P. Vinod, Vijay Laxmi, Manoj Singh Gaur, Grijesh Chauhan:
Detecting malicious files using non-signature-based methods. 199-240 - Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi:
SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network. 241-269 - Hassan Rasheed:
Vulnerability distribution scoring for software product security assessment. 270-285 - Muthulakshmi Angamuthu, Anitha Ramalingam:
Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem. 286-305
Volume 6, Number 4, 2014
- Yong Ho Kang, Kimoon Keum, Changbok Jang, Joo Man Kim:
Study of mobile virtualisation-based security technology for smartwork environment. 311-321 - Man Ki Kim, You Sik Hong:
Development AI traffic-safety system using RFID technique and USN theory. 322-332 - Hyunjun Choi:
Image encryption method for depth + texture video contents. 333-343 - Kyujin Lee:
An iterative layered interference canceller scheme for OFDM in wireless mesh security networks. 344-353 - Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li:
Cryptanalysis and improvement on a certificateless encryption scheme in the standard model. 354-371 - Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi:
Hybrid encryption/decryption technique using new public key and symmetric key algorithm. 372-382 - Andrew Mangle, Sandip C. Patel:
Issues in user authentication using security questions. 383-407
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.