


default search action
Journal of Internet Services and Information Security, Volume 3
Volume 3, Numbers 1/2, February 2013
- Baokang Zhao, Chunqing Wu, Qin Xin:

Guest Editorial: Special Issue on Advances in Internet Security and Technology. 1-4 - Kunwar Singh, C. Pandurangan, A. K. Banerjee:

Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext. 5-19 - Salim Allal, Saadi Boudjit:

Geocast Routing Protocols for VANETs: Survey and Geometry-Driven Scheme Proposal. 20-36 - Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang:

Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks. 37-48 - Marek Dabrowski, Justyna Gromada, Hassnaa Moustafa, Jacky Forestier:

A context-aware architecture for IPTV services personalization. 49-70 - Liang Sun, Fei Song, Dong Yang, Yajuan Qin:

DHR-CCN, Distributed Hierarchical Routing for Content Centric Network. 71-82 - Liang (Ben) Chen, Maria Prokopi:

Enabling Resource-Aware Ubiquitous Applications for Personal Cloud with a Pairing Device Framework. 83-100 - Denys A. Flores, Olga Angelopoulou, Richard J. Self:

An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together. 101-114 - S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:

Efficient Certificateless Online/Offline Signature with tight security. 115-137
Volume 3, Numbers 3/4, November 2013
- José Luis Hernández-Ramos, Antonio J. Jara, Leandro Marín, Antonio F. Skarmeta:

Distributed Capability-based Access Control for the Internet of Things. 1-16 - Hyungdong Kim, YongJe Choi, Dooho Choi, JaeCheol Ha:

A New Exponentiation Algorithm Resistant to Combined Side Channel Attack. 17-27 - Junho Choi, Chang Choi, Byeongkyu Ko, Dongjin Choi, Pankoo Kim:

Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment. 28-37 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:

Lattice Based Identity Based Proxy Re-Encryption Scheme. 38-51 - Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:

Externalizing Behaviour for Analysing System Models. 52-62 - Hwan-taek Lee, Minkyu Park, Seong-je Cho:

Detection and prevention of LeNa Malware on Android. 63-71 - Ho-Seok Kang, Sung-Ryul Kim:

A New Logging-based IP Traceback Approach using Data Mining Techniques. 72-80 - Shigeyoshi Shima, Ayako Komatsu:

Guidelines for the Prevention of Internal Improprieties in Japanese Organization. 81-93 - Hyejoo Lee, Changho Seo, Sang-Uk Shin:

DRM Cloud Architecture and Service Scenario for Content Protection. 94-105 - Jun Ye, Xiaofeng Chen, Jianfeng Ma:

Constructing Verifiable Random Number in Finite Field. 106-115 - Yonglin Zhou, Qing-Shan Li, Qidi Miao, Kangbin Yim:

DGA-Based Botnet Detection Using DNS Traffic. 116-123 - Guowei Wu, Zuosong Liu, Lin Yao, Zhenzhen Xu, Wei Wang:

A Fuzzy-based Trust Management in WSNs. 124-135 - Jaein Kim, Youngjun Lee, Kyungroul Lee, Taeyoung Jung, Dmitry Volokhov, Kangbin Yim:

Vulnerability to Flash Controller for Secure USB Drives. 136-145

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














