default search action
Journal of Internet Services and Information Security, Volume 6
Volume 6, Number 1, February 2016
- Fang-Yie Leu:
Editorial. 1 - Takashi Kurokawa, Ryo Nojima, Shiho Moriai:
On the security of CBC Mode in SSL3.0 and TLS1.0. 2-19 - Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol, Ram Dantu:
Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals. 20-36 - Nobuhide Kobayashi, Shuji Morisaki, Noritoshi Atsumi, Shuichiro Yamamoto:
Quantitative Non Functional Requirements evaluation using softgoal weight. 37-46 - Chien-Erh Weng, Vishal Sharma, Hsing-Chung Chen, Chuan-Hsien Mao:
PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks. 47-56
Volume 6, Number 2, May 2016
- Asem Kitana, Issa Traoré, Isaac Woungang:
Impact Study of a Mobile Botnet over LTE Networks. 1-22 - Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints. 23-36 - Borja Bordel Sánchez, Diego Sánchez de Rivera, Álvaro Sánchez-Picot:
Building unobtrusive wearable devices: an ergonomic cybernetic glove. 37-52 - Qian He, Qinghe Dong, Baokang Zhao, Yong Wang, Baohua Qiang:
P2P Traffic Optimization based on Congestion Distance and DHT. 53-69
Volume 6, Number 3, August 2016
- Asem Kitana, Issa Traoré, Isaac Woungang:
Impact Study of a Mobile Botnet over LTE Networks. 1-26 - Geonbae Na, Jongsu Lim, Kyoungmin Kim, Jeong Hyun Yi:
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART. 27-39 - Siamak Aram, Rouzbeh A. Shirvani, Eros Pasero, Mohamed F. Chouikha:
Implantable Medical Devices; Networking Security Survey. 40-60 - Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version). 61-113
Volume 6, Number 4, November 2016
- Clémentine Gritti, Willy Susilo, Thomas Plantard:
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record. 1-34 - S. Sree Vivek, S. Sharmila Deva Selvi, Pallavi Chandrasekar, C. Pandu Rangan:
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives. 35-53 - Nak Young Kim, Jaewoo Shim, Seong-je Cho, Minkyu Park, Sangchul Han:
Android Application Protection against Static Reverse Engineering based on Multidexing. 54-64 - Tomoyuki Ishida, Yuki Shinotsuka, Misaki Iyobe, Noriki Uchida, Kaoru Sugita, Yoshitaka Shibata:
Development of a Zoo Walk Navigation System using the Positional Measurement Technology and the Wireless Communication Technology. 65-84
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.