


default search action
ISC International Journal of Information Security, Volume 1
Volume 1, Number 1, January 2009
- Mohammad Reza Aref, Rasool Jalili:

Editorial. 1-2
- Ali Fanian, Mehdi Berenjkoub, T. Aaron Gulliver:

A TESLA-based mutual authentication protocol for GSM networks. 3-15 - Vajiheh Sabeti

, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani:
Steganalysis of embedding in difference of image pixel pairs by neural network. 17-26 - Hoi Ting Poon, Ali Miri:

A collusion attack on the fuzzy vault scheme. 27-34 - Jafar Haadi Jafarian, Morteza Amini:

CAMAC: a context-aware mandatory access control model. 35-54 - Rasoul Ramezanian:

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions. 55-67
Volume 1, Number 2, July 2009
- Rasool Jalili:

Editorial. 69-70
- Jovan Dj. Golic:

Moving dispersion method for statistical anomaly detection in intrusion detection systems. 71-90
- Ian G. Harris, Thoulfekar Alrahem, Alex Chen, Nicholas DiGiuseppe, Jefferey Gee, Shang-Pin Hsiao, Sean Mattox, Taejoon Park, Saravanan Selvaraj, Albert Tam, Marcel Carlsson:

Security testing of session initiation protocol implementations. 91-103 - M. Tariq Banday, Nisar Ahmed Shah:

Image flip CAPTCHA. 105-123 - Morteza Nikooghadam, Ali Zakerolhosseini:

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. 125-131

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














