


default search action
Journal of Information Security, Volume 3
Volume 3, Number 1, January 2012
- Peter Schartner:

Random but System-Wide Unique Unlinkable Parameters. 1-10 - Rasim M. Alguliev, Saadat A. Nazirova:

Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem. 11-17 - Yuji Waizumi, Hiroshi Tsunoda, Masashi Tsuji, Yoshiaki Nemoto:

A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy. 18-24 - Ilung Pranata, Geoff Skinner, Rukshan Athauda

:
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment. 25-38 - Yogendra Narain Singh, Sanjay Kumar Singh:

Evaluation of Electrocardiogram for Biometric Authentication. 39-48 - Vijay Anand, Jafar Saniie, Erdal Oruklu:

Security Policy Management Process within Six Sigma Framework. 49-58 - Tat Wing Chim, Jeanno Chin Long Cheung, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:

SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET. 59-67
Volume 3, Number 2, April 2012
- Yaser Jararweh, Lo'ai Ali Tawalbeh, Hala Tawalbeh, Abidalrahman Moh'd:

Hardware Performance Evaluation of SHA-3 Candidate Algorithms. 69-76 - Tahir Amin, Dimitrios Hatzinakos:

Determinants in Human Gait Recognition. 77-85 - Lanfranco Lopriore:

Reference Encryption for Access Right Segregation and Domain Representation. 86-90 - Romany Fouad Mansour, Waleed F. Awwad, Amal A. Mohammed:

A Robust Method to Detect Hidden Data from Digital Images. 91-95 - Adel Hammad Abusitta:

A Visual Cryptography Based Digital Image Copyright Protection. 96-104 - Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:

Privacy Preserving Scheme for Location-Based Services. 105-112 - Shweta Tripathi, Bandu Baburao Meshram:

Digital Evidence for Database Tamper Detection. 113-121 - Sanjeev Kumar, Raja Sekhar Reddy Gade:

Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks. 122-137 - Ming Tong, Tao Chen, Wei Zhang, Linna Dong:

New Video Watermark Scheme Resistant to Super Strong Cropping Attacks. 138-148 - Vladimir V. Grishachev:

Detecting Threats of Acoustic Information Leakage Through Fiber Optic Communications. 149-155 - Yonghong Chen, Jiancong Chen:

Digital Image Watermarking Based on Mixed Error Correcting Code. 156-161 - Shahriar Mohammadi, Vahid Allahvakil, Mojtaba Khaghani:

Effect of Network Traffic on IPS Performance. 162-168 - Ahmad Bakhtiyari Shahri, Zuraini Ismail:

A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS. 169-176 - Khalid O. Elaalim, Shoubao Yang:

A Fair Electronic Cash System with Identity-Based Group Signature Scheme. 177-183
Volume 3, Number 3, July 2012
- Xinqian Lin, Shengqiang Tang, Wentao Huang:

The Extended Tanh Method for Compactons and Solitons Solutions for the CH(n, 2n - 1, 2n, -n) Equations. 185-188 - Archana Tiwari, Manisha Sharma:

Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication. 189-195 - K. K. Sindhu, B. B. Meshram:

Digital Forensics and Cyber Crime Datamining. 196-201 - Amin Hashemi Pour, Ali Payandeh:

A New Steganography Method Based on the Complex Pixels. 202-208 - Rabiah Ahmad, Zahri Yunos:

The Application of Mixed Method in Developing a Cyber Terrorism Framework. 209-214 - Zachary Miller, Wei Hu:

Data Stream Subspace Clustering for Anomalous Network Packet Detection. 215-223 - Aziz Baayer, Nourddine Enneya, Mohammed Elkoutbi:

Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs. 224-230 - Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff:

Perception on Cyber Terrorism: A Focus Group Discussion Approach. 231-237 - Usha Banerjee, Gaurav Batra, K. V. Arya:

Feedback Reliability Ratio of an Intrusion Detection System. 238-244
Volume 3, Number 4, October 2012
- Qingquan Sun, Peng Wu, Yeqing Wu, Mengcheng Guo, Jiang Lu:

Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case. 245-250 - Maurizio Talamo

, Maulahikmah Galinium, Christian H. Schunck
, Franco Arcieri:
Secure Messaging Implementation in OpenSC. 251-258 - Gholam Reza Zargar, Tania Baghaie:

Category-Based Intrusion Detection Using PCA. 259-271 - Moad Mowafi

, Lo'ai Ali Tawalbeh, Walid A. Aljoby, Mohammad Al-Rousan:
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol. 272-280 - Thomas Ndié Djotio, Claude Tangha, Guy Bertrand Fopak:

MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents. 281-294 - Amir Mohamed Talib

, Rodziah Binti Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad
:
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture. 295-306 - Yoshio Kakizaki, Maeda Kazunari, Keiichi Iwamura:

Identifier Migration for Identity Continuance in Single Sign-On. 307-313 - Mario Góngora-Blandón, Miguel Vargas-Lombardo:

State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming. 314-318 - Shay Gueron, Vlad Krasnov:

Simultaneous Hashing of Multiple Messages. 319-325 - Sandeep K. Sood:

Dynamic Identity Based Authentication Protocol for Two-Server Architecture. 326-334 - Alfredo Maesa, Fabio Garzia, Michele Scarpiniti, Roberto Cusani:

Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models. 335-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














