


default search action
Information Security Journal: A Global Perspective, Volume 27
Volume 27, Number 1, 2018
- Laima Kauspadiene, Simona Ramanauskaite

, Antanas Cenys
, Justinas Janulevicius, Justinas Rastenis
:
Modeling of enterprise management structure for data leakage evaluation. 1-13 - Nour El Houda Asma Merabet, Redha Benzid:

Progressive image secret sharing scheme based on Boolean operations with perfect reconstruction capability. 14-28 - Longbin Chen

, Li-Chiou Chen, Nader Nassar:
Seed-based authentication for mobile clients across multiple devices. 29-41 - Samta Gajbhiye

, Sanjeev Karmakar, Monisha Sharma, Sanjay Sharma:
Two-party secure connection in Bluetooth-enabled devices. 42-56 - Noor R. Al-Kazaz

, Sean A. Irvine, William John Teahan:
An automatic cryptanalysis of simple substitution ciphers using compression. 57-75
Volume 27, Number 2, 2018
- K. Pradeep, T. Prem Jacob

:
CGSA scheduler: A multi-objective-based hybrid approach for task scheduling in cloud environment. 77-91 - Mehmet Ulvi Simsek, Feyza Yildirim Okay

, Dilan Mert, Suat Özdemir
:
TPS3: A privacy preserving data collection protocol for smart grids. 102-118
- Ammar Amran, Zarul Fitri Zaaba, Manmeet Kaur Mahinderjit Singh

:
Habituation effects in computer security warning. 119-131
Volume 27, Number 3, 2018
- Sabah Delenda, Lemnouar Noui

:
A new steganography algorithm using polar decomposition. 133-144 - Shymalagowri Selvaganapathy

, Mathappan Nivaashini
, Hemapriya Natarajan:
Deep belief network based detection and categorization of malicious URLs. 145-161
- Diego M. Mendez

, Ioannis Papapanagiotou
, Baijian Yang
:
Internet of things: Survey on security. 162-182
Volume 27, Number 4, 2018
- K. Shanthi, D. Murugan, T. Ganesh Kumar:

Trust-based intrusion detection with secure key management integrated into MANET. 183-191
- Ammar Amran, Zarul Fitri Zaaba, Manmeet Kaur Mahinderjit Singh

:
Habituation effects in computer security warning. 192-204
- Lanfranco Lopriore:

Key management in tree shaped hierarchies. 205-213 - Krishna Prakasha

, Balachandra Muniyal, Vasundhara Acharya
, Suyash Krishna, Smriti Prakash:
Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list. 214-229 - Kassim S. Mwitondi

, Shahrzad Zargari:
An iterative multiple sampling method for intrusion detection. 230-239
Volume 27, Numbers 5-6, 2018
- Ram Gopal Sharma

, Priti Dimri, Hitendra Garg:
Visual cryptographic techniques for secret image sharing: a review. 241-259
- Jasmin Kaur, Rozita A. Dara, Charlie Obimbo, Fei Song, Karen Menard:

A comprehensive keyword analysis of online privacy policies. 260-275 - Oladayo Olufemi Olakanmi, Samuel Oluwaseye Oke:

MASHED: Security and privacy-aware mutual authentication scheme for heterogeneous and distributed mobile cloud computing services. 276-291 - Saud Alotaibi

, Steven Furnell
, Nathan L. Clarke
:
A novel transparent user authentication approach for mobile applications. 292-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














