


default search action
International Journal of Information Security and Privacy, Volume 7
Volume 7, Number 1, 2013
- Nigel J. Martin, John L. Rice

:
Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users. 1-15 - Satya Prakash, Abhishek Vaish

, Natalie Coull, SaravanaKumar G, T. N. Srinidhi, Jayaprasad Botsa:
Child Security in Cyberspace Through Moral Cognition. 16-29 - Mathews Z. Nkhoma, Duy Pham Thien Dang

:
Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach. 30-44 - Ousmane Amadou Dia, Csilla Farkas:

Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes. 45-62 - Walid Y. Zibideh, Mustafa M. Matalgah:

Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time. 63-75
Volume 7, Number 2, 2013
- Katharina Bräunlich, Rüdiger Grimm:

Development of A Formal Security Model for Electronic Voting Systems. 1-28 - Ammar Alazab

, Michael Hobbs
, Jemal H. Abawajy, Ansam Khraisat:
Malware Detection and Prevention System Based on Multi-Stage Rules. 29-43 - Siddharth Singh, Tanveer J. Siddiqui

:
Robust Image Data Hiding Technique for Copyright Protection. 44-56 - Khaoula Marzouki, Amira Radhouani, Narjes Ben Rajeb:

Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol. 57-85
Volume 7, Number 3, 2013
- Omar Banimelhem

, Lo'ai Ali Tawalbeh
, Moad Mowafi
, Mohammed A. Al-Batati:
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm. 1-15 - Daniela Simic-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Roßnagel:

Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA. 16-35 - Esraa Omran, Tyrone Grandison

, David Nelson, Albert Bokma:
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain. 36-52 - Michele Tomaiuolo

:
dDelega: Trust Management for Web Services. 53-67
Volume 7, Number 4, 2013
- Shadi Rasheed Masadeh, Shadi A. Aljawarneh

, Ashraf Odeh, Abdullah A. Alhaj:
Secure Communication: A Proposed Public Key Watermark System. 1-10 - K. Saravanan

, A. Senthilkumar:
Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design. 11-21 - Francis Akowuah, Xiaohong Yuan, Jinsheng Xu

, Hong Wang:
A Survey of Security Standards Applicable to Health Information Systems. 22-36 - Srinivasa K. G.

:
An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines. 37-52 - Salima Hacini, Zahia Guessoum, Mohamed Cheikh:

False Alarm Reduction Using Adaptive Agent-Based Profiling. 53-74

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














