


default search action
Journal of Information Security, Volume 1
Volume 1, Number 1, July 2010
- Hui Lin, Gyungho Lee:

Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace. 1-10 - Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou:

Fast Forgery Detection with the Intrinsic Resampling Properties. 11-22 - Andrews Samraj, Md Shohel Sayeed, Chu Kiong Loo, Nikos E. Mastorokis:

Eliminating Forgers Based on Intra Trial Variability in Online Signature Verification Using Handglove and Photometric Signals. 23-28 - J. Nafeesa Begum, Krishnan Kumar, Vembu Sumathy:

Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme. 29-40 - Yi Luo, Ferenc Szidarovszky, Youssif B. Al-Nashif, Salim Hariri:

Game Theory Based Network Security. 41-44
Volume 1, Number 2, October 2010
- Yongjian Li, Jun Pang:

Extending the Strand Space Method with Timestamps: Part I the Theory. 45-55 - Yongjian Li, Jun Pang:

Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V. 56-67 - Vacharee Prashyanusorn, Yusaku Fujii, Somkuan Kaviya, Somsak Mitatha, Preecha P. Yupapin:

Sustainable Tourism Using Security Cameras with Privacy Protecting Ability. 68-73 - Vaibhav Ranchhoddas Pandya, Mark Stamp

:
iPhone Security Analysis. 74-87 - Sanjeev Kumar, Orifiel Gomez:

Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment. 88-94

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














