


default search action
Journal of Internet Services and Information Security, Volume 4
Volume 4, Number 1, February 2014
- Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:

Lattice Based Universal Re-encryption for Mixnet. 1-11 - Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:

Performance of Distributed Text Processing System Using Hadoop. 12-24 - Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:

MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks. 25-36 - Nan Guo, Jia Wang, Tianhan Gao, Kangbin Yim:

Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential. 37-46 - Kun-Lin Tsai, Fang-Yie Leu, Tien-Han Wu, Shin-shiuan Chiou, Yu-Wei Liu, Han-Yun Liu:

A Secure ECC-based Electronic Medical Record System. 47-57 - Lidia Ogiela, Marek R. Ogiela:

Towards Cognitive Cryptography. 58-63 - ChanChamnab Than, SangYong Han:

Improving Recommender Systems by Incorporating Similarity, Trust and Reputation. 64-76
Volume 4, Number 2, May 2014
- Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:

Guest Editorial: Special Issue on Cyber Security Protections and Applications. 1-3 - Wolter Pieters, Zofia Lukszo, Dina Hadziosmanovic, Jan van den Berg:

Reconciling Malicious and Accidental Risk in Cyber Security. 4-26 - Jun Ye, Yong Ding, Xing-zhong Xiong, Shu-Lin Wu:

Dynamic Model for Anonymity Measurement Based on Information Entropy. 27-37 - Hiroshi Fujinoki, Christopher A. Chelmecki, David M. Henry:

Fail-Safe Security Architecture to Prevent Privacy Leaks from E-commerce Servers. 38-54 - Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi:

DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android. 55-69 - Keying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma:

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme. 70-82
Volume 4, Number 3, August 2014
- Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:

Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units. 1-20 - Ram B. Basnet, Andrew H. Sung:

Learning to Detect Phishing Webpages. 21-39 - Tomoyuki Ishida, Kazuhiro Takahagi, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata:

The Real-time Disaster Damage Information Sharing System for Information Acquiring in Large-scale Natural Disaster. 40-58 - Zhifeng Xiao, Yun Wang:

Leveraging Mobile Agents for Log Analysis in Data Center Networks. 59-71 - Jakub Breier:

Asset Valuation Method for Dependent Entities. 72-81 - Revisiting the BAN-Modified Andrew Secure RPC Protocol. 82-96

Volume 4, Number 4, November 2014
- Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:

Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. 1-13 - Fang-Yie Leu, Yi-Ting Hsiao:

A Grid System Detecting Internal Malicious Behaviors at System Call Level. 14-24 - Dongjin Kim, Seong-je Cho, Sangchul Han, Minkyu Park, Ilsun You:

Open Source Software Detection using Function-level Static Software Birthmark. 25-37 - JaeCheol Ha, YongJe Choi, Dooho Choi, Hoonjae Lee:

Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm. 38-51 - Hsing-Chung Chen, Hui-Kai Su:

A Cooperative Trust Bit-Map Routing Protocol Using the GA Algorithm for Reducing the Damages from the InTs in WANETs. 52-70 - Sangho Park, Jihyun Bang, Mirim Ahn, Woomin Lee, Taekyoung Kwon:

A Method for Hiding Link Layer Addresses Using Bloom Filter in Wireless Sensor Networks. 71-81 - Mi-Young Cho, Young-Sook Jeong:

Face Recognition Performance Comparison of Fake Faces with Real Faces in Relation to Lighting. 82-90 - Mye M. Sohn, Saerom Kang, Hyun Jung Lee:

Integrated Data Model Development Framework for the Architecture Descriptions. 91-102 - In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, Eul Gyu Im:

Malware Similarity Analysis using API Sequence Alignments. 103-114 - Su-Wan Park, Jeong Hyun Yi:

Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android. 115-126 - Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:

Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. 127-137

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














