


default search action
International Journal of Information Security and Privacy, Volume 9
Volume 9, Number 1, 2015
- Hossain Shahriar

, Hisham M. Haddad:
Client-Side Detection of Clickjacking Attacks. 1-25 - Teodor Sommestad, Henrik Karlzén, Jonas Hallberg:

A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. 26-46 - Anser Ghazzaal Ali Alquraishee, Jayaprakash Kar

, Naomie Salim:
Short Online/Off-line Signature Scheme for Wireless Sensor Networks. 47-61 - Michael Lapke, Gurpreet Dhillon

:
Disassociations in Security Policy Lifecycles. 62-77
Volume 9, Number 2, 2015
- Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang:

Several Oblivious Transfer Variants in Cut-and-Choose Scenario. 1-12 - Aminu Bello

, William Liu
, Quan Bai
, Ajit Narayanan:
Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective. 13-30 - Weidong Yang, Limin Sun, Zhenqiang Xu:

Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks. 31-59 - Ali Farooq

, Johanna Isoaho, Seppo Virtanen
, Jouni Isoaho
:
Observations on Genderwise Differences among University Students in Information Security Awareness. 60-74
Volume 9, Number 3, 2015
- Milica Milutinovic, Andreas Put, Bart De Decker:

An Efficient, Anonymous and Unlinkable Incentives Scheme. 1-20 - Rui Wang

, Zhiyong Zhang, Lei Ju, Zhiping Jia:
A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking. 21-40 - Jing Long, Dafang Zhang, Wei Liang

, Xia-an Bi:
Signature Restoration for Enhancing Robustness of FPGA IP Designs. 41-56 - Abdullah Mohammed Almuhaideb

, Bala Srinivasan:
Authentication in Ubiquitous Networking. 57-83 - Ruiyang Xu, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu

, Zheng Yan
:
Software Defined Intelligent Building. 84-99
Volume 9, Number 4, 2015
- S. Selva Nidhyananthan

, Prasad M., R. Shantha Selva Kumari
:
Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group. 1-19 - Mohamed Amine Boudia

, Reda Mohamed Hamou
, Abdelmalek Amine
:
A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM. 26-58 - Mahinder Pal Singh Bhatia, Manjot Bhatia, Sunil Kumar Muttoo:

Secure Group Message Transfer Stegosystem. 59-76

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














