


default search action
Information Security Journal: A Global Perspective, Volume 22
Volume 22, Number 1, 2013
- Kaleem Usmani, Amar Kumar Mohapatra, Nupur Prakash:

An Improved Framework for Incident Handling. 1-9 - Abhishek Basu

, Subir Kumar Sarkar:
On the Implementation of Robust Copyright Protection Scheme Using Visual Attention Model. 10-20 - Manjot Bhatia, Sunil Kumar Muttoo, Mahinder Pal Singh Bhatia

:
Secure Group Communication with Hidden Group Key. 21-34 - Udai Pratap Rao

, Dhiren R. Patel:
Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions. 35-45 - Lunzhi Deng, Chenglian Liu

, Xiangbin Wang:
An Improved Identity-Based Ring Signcryption Scheme. 46-54
Volume 22, Number 2, 2013
- Shellie Wedman, Annette Tetmeyer, Hossein Saiedian

:
An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking Attacks. 55-67 - Vik Pant, William P. Wagner:

Hyper-Encryption: Eternal Secrecy Using the Bounded Storage and Limited Access Models. 68-82 - Abdelrahman Desoky:

Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm - High Level of Security for Fooling the Enemy. 83-97 - Arun Vijayaragavan

, P. Mohan Kumar, K. L. Shunmuganathan
:
Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory. 98-103
Volume 22, Number 3, 2013
- Rajesh Kumar Tiwari

, Gadadhar Sahoo
:
A Novel Watermarking Scheme for Secure Relational Databases. 105-116 - Shilpa Kaman, K. Swetha, Syed Akram

, G. Varaprasad:
Remote User Authentication Using a Voice Authentication System. 117-125 - Apostolos P. Fournaris:

A Distributed Approach of a Threshold Certificate-Based Encryption Scheme with No Trusted Entities. 126-139 - Shabana Kazi, Mark Stamp

:
Hidden Markov Models for Software Piracy Detection. 140-149
Volume 22, Number 4, 2013
- Stilianos Vidalis, Olga Angelopoulou

:
Deception and Maneuver Warfare Utilizing Cloud Resources. 151-158 - Osama Hayatle, Hadi Otrok

, Amr M. Youssef:
A Markov Decision Process Model for High Interaction Honeypots. 159-170 - Eyong B. Kim:

Information Security Awareness Status of Business College: Undergraduate Students. 171-179 - Eben I. Kaplan:

Tackling the Password Problem: Image- and Gesture-Based Alternatives to Alphanumeric Passwords. 180-186 - Michael Workman, Daniel C. Phelps

, Robert C. Hare:
A Study of Performative Hactivist Subcultures and Threats to Businesses. 187-200
- Larry Marks:

Inside Cyber Warfare, Mapping the Cyber Underworld, by Carr, Jeffrey 2nd ed, Newton, MA: O'Reilly Media, 2012, 318p., $39.99. ISBN 978-1-449-31004-2. 201-202 - Nicolas Sklavos:

C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.CreateSpace Independent Publishing Platform, 2013, 102p., $36.99. ISBN 1480237418. 203
Volume 22, Numbers 5-6, 2013
- Giorgio Di Natale:

TRUDEVICE: A COST Action on Trustworthy Manufacturing and Utilization of Secure Devices. 205-207
- Ariel Burg, Osnat Keren:

On the Efficiency of Berger Codes Against Error Injection Attacks on Parallel Asynchronous Communication Channels. 208-215 - Igor Shumsky, Osnat Keren:

Enhancement of Hardware Security by Hamming-Ball Based State Assignment. 216-225 - Sophie Dupuis

, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre:
On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis. 226-236 - Diego Alberto, Paolo Maistri, Régis Leveugle:

Forecasting the Effects of Electromagnetic Fault Injections on Embedded Cryptosystems. 237-243 - Mikhail Platonov, Josef Hlavác, Róbert Lórencz

:
Using Power-Up SRAM State of Atmel ATmega1284P Microcontrollers as Physical Unclonable Function for Key Generation and Chip Identification. 244-250 - Feng Lu, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre:

Multilevel Ionizing-Induced Transient Fault Simulator. 251-264 - Linus Feiten, Andreas Spilla, Matthias Sauer, Tobias Schubert, Bernd Becker

:
Implementation and Analysis of Ring Oscillator PUFs on 60 nm Altera Cyclone FPGAs. 265-273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














