


default search action
International Journal of Information and Computer Security, Volume 5
Volume 5, Number 1, 2012
- Zhongqiu Xu, Liangju Li, Haibo Gao:

Bandwidth efficient buyer-seller watermarking protocol. 1-10 - Haichang Gao, Licheng Ma, Wei Jia, Fei Ye:

Multiple password interference in graphical passwords. 11-27 - Sachin Mehta, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy:

Tampering resistant self recoverable watermarking method using error correction codes. 28-47 - Vimalathithan Subramanian, Remzi Seker, Srini Ramaswamy, Rathinasamy B. Lenin:

PCIEF: a policy conflict identification and evaluation framework. 48-67 - Mustapha Hedabou:

Securing pairing-based cryptography on smartcards. 68-76
Volume 5, Number 2, 2012
- Danilo Valeros Bernardo:

Security risk assessment: toward a comprehensive practical risk management. 77-104 - Somayeh Naderi Vesal, Mohammad Fathian:

Efficient and secure credit card payment protocol for mobile devices. 105-114 - Jonathan Pan, Chun Che Fung

:
An agent-based model to simulate coordinated response to malware outbreak within an organisation. 115-131 - Md. Iftekhar Salam

, Hoon-Jae Lee:
On the algebraic attack against summation type keystream generators. 132-149
Volume 5, Number 3, 2013
- Juggapong Natwichai

, Xue Li
, Asanee Kawtrakul:
Incremental processing and indexing for (k, e)-anonymisation. 151-170 - Rkia Aouinatou, Mostafa Belkasmi

:
On the conventional public key in identification-based encryption: the case of RSA. 171-201 - V. Santhi

, Arunkumar Thangavelu, Pachiyappan Arulmozhivarman
:
Adaptive visible watermarking in Hadamard domain for digital images. 202-223 - Manish Mahajan

, Navdeep Kaur
:
Steganography in coloured images using wavelet domain-based saliency map. 224-235 - Qasem Abu Al-Haija

, Ahmad Al Badawi
:
Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2N) using parallel multipliers and architectures. 236-250
Volume 5, Number 4, 2013
- Lawrence Teo, Gail-Joon Ahn

:
Extensible policy framework for heterogeneous network environments. 251-274 - Anshu Tripathi, Umesh Kumar Singh:

Evaluation of severity index of vulnerability categories. 275-289 - Mahmood Al-khassaweneh

, Shefa Tawalbeh:
A value transformation and random permutation-based coloured image encryption technique. 290-300 - Anup C. Sharma, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney

, William L. Sousan:
A social dimensional cyber threat model with formal concept analysis and fact-proposition inference. 301-333 - Zhanshan Ma:

First passage time and first passage percolation models for analysing network resilience and effective strategies in strategic information warfare research: a brief survey and perspective. 334-358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














