default search action
Journal of Information Security, Volume 1
Volume 1, Number 1, July 2010
- Hui Lin, Gyungho Lee:
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace. 1-10 - Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou:
Fast Forgery Detection with the Intrinsic Resampling Properties. 11-22 - Andrews Samraj, Md Shohel Sayeed, Chu Kiong Loo, Nikos E. Mastorokis:
Eliminating Forgers Based on Intra Trial Variability in Online Signature Verification Using Handglove and Photometric Signals. 23-28 - J. Nafeesa Begum, Krishnan Kumar, Vembu Sumathy:
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme. 29-40 - Yi Luo, Ferenc Szidarovszky, Youssif B. Al-Nashif, Salim Hariri:
Game Theory Based Network Security. 41-44
Volume 1, Number 2, October 2010
- Yongjian Li, Jun Pang:
Extending the Strand Space Method with Timestamps: Part I the Theory. 45-55 - Yongjian Li, Jun Pang:
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V. 56-67 - Vacharee Prashyanusorn, Yusaku Fujii, Somkuan Kaviya, Somsak Mitatha, Preecha P. Yupapin:
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability. 68-73 - Vaibhav Ranchhoddas Pandya, Mark Stamp
:
iPhone Security Analysis. 74-87 - Sanjeev Kumar, Orifiel Gomez:
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment. 88-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.