default search action
Journal of Information Security and Applications, Volume 34
Volumes 34, Part 1, June 2017
- Karen Renaud, Stephen Flowerday:
Human-centred cyber security. 1 - Andrew Hoskins:
Risk media and the end of anonymity. 2-7 - Paul Gerber, Melanie Volkamer, Karen Renaud:
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. 8-26 - Luigi Lo Iacono, Peter Leo Gorski, Josephine Grosse, Nils Gruschka:
Signalling over-privileged mobile applications using passive security indicators. 27-33 - Lydia Kraus, Ina Wechsung, Sebastian Möller:
Psychological needs as motivators for security and privacy actions on smartphones. 34-45 - Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Exploring behavioral information security networks in an organizational context: An empirical case study. 46-62 - Brian Greaves, Marijke Coetzee:
Access control for secure information sharing in smart content spaces. 63-75 - Karen Renaud, Stephen Flowerday:
Contemplating human-centred security & privacy research: Suggesting future directions. 76-81
Volumes 34, Part 2, June 2017
- Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation. 84-91 - Firas Al Khalil, Alban Gabillon, Patrick Capolsini:
A comprehensive view on quantity based aggregation for cadastral databases. 92-107 - Xiaonan Wang, Yi Mu:
Communication security and privacy support in 6LoWPAN. 108-119 - Vasileios Anastopoulos, Sokratis K. Katsikas:
A structured methodology for deploying log management in WANs. 120-132 - Wei-Liang Tai, Ya-Fen Chang, Wei-Han Li:
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. 133-141 - Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari Barani:
A new transform domain steganography based on modified logistic chaotic map for color images. 142-151 - Kevin I. Jones, Helge Janicke, Christian Facchi, Leandros A. Maglaras:
Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security". 152 - Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
Detection of attacks based on known vulnerabilities in industrial networked systems. 153-165 - Giuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler, Mark Carolan, Damien Conroy, Konstantin Böttinger, Mark Gall, Gerd Brost, Christophe Ponchel, Mirko Haustein, Helmut Kaufmann, Klaus Theuerkauf, Pia Olli:
A collaborative cyber incident management system for European interconnected critical infrastructures. 166-182 - Ivo Friedberg, Kieran McLaughlin, Paul Smith, David M. Laverty, Sakir Sezer:
STPA-SafeSec: Safety and security analysis for cyber-physical systems. 183-196 - Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
A security evaluation of IEC 62351. 197-204 - Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia:
Special issue on Secure Computation on Encrypted Data. 205-206 - Johannes Schneider, Bin Lu:
Secure numerical and logical multi party operations. 207-217 - Menachem Domb, Elisheva Bonchek-Dokow, Guy Leshem:
Lightweight adaptive Random-Forest for IoT rule generation and execution. 218-224 - Jian Xu, Yewen Cao, Deqiang Wang:
Generalised regenerating codes for securing distributed storage systems against eavesdropping. 225-232 - Khalil Hariss, Hassan Noura, Abed Ellatif Samhat:
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications. 233-242 - Mahmoud F. Abd Elzaher, Mohamed Shalaby, Yasser M. Kamal, Salwa El-Ramly:
Securing digital voice communication using non-autonomous modulated chaotic signal. 243-250 - Lirong Qiu, Xin Sun, Xishun Zhao:
Realizing correlated equilibrium by secure computation. 251-254 - Parwinder Kaur Dhillon, Sheetal Kalra:
A lightweight biometrics based remote user authentication scheme for IoT services. 255-270 - Duncan Smith:
Secure pseudonymisation for privacy-preserving probabilistic record linkage. 271-279 - Zengpeng Li, Chunguang Ma, Ding Wang, Gang Du:
Toward single-server private information retrieval protocol via learning with errors. 280-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.