default search action
Journal of Information Security and Applications, Volume 30
Volume 30, October 2016
- Erkam Lüy, Zekeriya Y. Karatas, Hüseyin Ergin:
Comment on "An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)". 1-2 - Hedieh Sajedi:
Steganalysis based on steganography pattern discovery. 3-14 - Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz:
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. 15-26 - Simon Parkinson, Andrew Crampton:
Identification of irregularities and allocation suggestion of relative file system permissions. 27-39 - Jianghong Wei, Wenfen Liu, Xuexian Hu:
Security pitfalls of "ePASS: An expressive attribute-based signature scheme". 40-45 - Michele Bugliesi, Stefano Calzavara, Sebastian Mödersheim, Paolo Modesti:
Security protocol specification and verification with AnBx. 46-63 - Ankita Chaturvedi, Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay:
Design of a secure smart card-based multi-server authentication scheme. 64-80 - Patricia Ghann, Shiguang Ju, Conghua Zhou:
Testing access control policy through Change Rule and Swap Rule Algorithm (CRSR). 81-93 - H. Dadgostar, Fatemeh Afsari:
Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. 94-104 - Jalesh Kumar, Shivananda Nirmala:
A novel and efficient method based on knight moves for securing the information contents of images - A parallel approach. 105-117
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.