default search action
Journal of Information Security, Volume 3
Volume 3, Number 1, January 2012
- Peter Schartner:
Random but System-Wide Unique Unlinkable Parameters. 1-10 - Rasim M. Alguliev, Saadat A. Nazirova:
Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem. 11-17 - Yuji Waizumi, Hiroshi Tsunoda, Masashi Tsuji, Yoshiaki Nemoto:
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy. 18-24 - Ilung Pranata, Geoff Skinner, Rukshan Athauda:
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment. 25-38 - Yogendra Narain Singh, Sanjay Kumar Singh:
Evaluation of Electrocardiogram for Biometric Authentication. 39-48 - Vijay Anand, Jafar Saniie, Erdal Oruklu:
Security Policy Management Process within Six Sigma Framework. 49-58 - Tat Wing Chim, Jeanno Chin Long Cheung, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET. 59-67
Volume 3, Number 2, April 2012
- Yaser Jararweh, Lo'ai Ali Tawalbeh, Hala Tawalbeh, Abidalrahman Moh'd:
Hardware Performance Evaluation of SHA-3 Candidate Algorithms. 69-76 - Tahir Amin, Dimitrios Hatzinakos:
Determinants in Human Gait Recognition. 77-85 - Lanfranco Lopriore:
Reference Encryption for Access Right Segregation and Domain Representation. 86-90 - Romany Fouad Mansour, Waleed F. Awwad, Amal A. Mohammed:
A Robust Method to Detect Hidden Data from Digital Images. 91-95 - Adel Hammad Abusitta:
A Visual Cryptography Based Digital Image Copyright Protection. 96-104 - Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
Privacy Preserving Scheme for Location-Based Services. 105-112 - Shweta Tripathi, Bandu Baburao Meshram:
Digital Evidence for Database Tamper Detection. 113-121 - Sanjeev Kumar, Raja Sekhar Reddy Gade:
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks. 122-137 - Ming Tong, Tao Chen, Wei Zhang, Linna Dong:
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks. 138-148 - Vladimir V. Grishachev:
Detecting Threats of Acoustic Information Leakage Through Fiber Optic Communications. 149-155 - Yonghong Chen, Jiancong Chen:
Digital Image Watermarking Based on Mixed Error Correcting Code. 156-161 - Shahriar Mohammadi, Vahid Allahvakil, Mojtaba Khaghani:
Effect of Network Traffic on IPS Performance. 162-168 - Ahmad Bakhtiyari Shahri, Zuraini Ismail:
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS. 169-176 - Khalid O. Elaalim, Shoubao Yang:
A Fair Electronic Cash System with Identity-Based Group Signature Scheme. 177-183
Volume 3, Number 3, July 2012
- Xinqian Lin, Shengqiang Tang, Wentao Huang:
The Extended Tanh Method for Compactons and Solitons Solutions for the CH(n, 2n - 1, 2n, -n) Equations. 185-188 - Archana Tiwari, Manisha Sharma:
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication. 189-195 - K. K. Sindhu, B. B. Meshram:
Digital Forensics and Cyber Crime Datamining. 196-201 - Amin Hashemi Pour, Ali Payandeh:
A New Steganography Method Based on the Complex Pixels. 202-208 - Rabiah Ahmad, Zahri Yunos:
The Application of Mixed Method in Developing a Cyber Terrorism Framework. 209-214 - Zachary Miller, Wei Hu:
Data Stream Subspace Clustering for Anomalous Network Packet Detection. 215-223 - Aziz Baayer, Nourddine Enneya, Mohammed Elkoutbi:
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs. 224-230 - Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff:
Perception on Cyber Terrorism: A Focus Group Discussion Approach. 231-237 - Usha Banerjee, Gaurav Batra, K. V. Arya:
Feedback Reliability Ratio of an Intrusion Detection System. 238-244
Volume 3, Number 4, October 2012
- Qingquan Sun, Peng Wu, Yeqing Wu, Mengcheng Guo, Jiang Lu:
Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case. 245-250 - Maurizio Talamo, Maulahikmah Galinium, Christian H. Schunck, Franco Arcieri:
Secure Messaging Implementation in OpenSC. 251-258 - Gholam Reza Zargar, Tania Baghaie:
Category-Based Intrusion Detection Using PCA. 259-271 - Moad Mowafi, Lo'ai Ali Tawalbeh, Walid A. Aljoby, Mohammad Al-Rousan:
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol. 272-280 - Thomas Ndié Djotio, Claude Tangha, Guy Bertrand Fopak:
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents. 281-294 - Amir Mohamed Talib, Rodziah Binti Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad:
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture. 295-306 - Yoshio Kakizaki, Maeda Kazunari, Keiichi Iwamura:
Identifier Migration for Identity Continuance in Single Sign-On. 307-313 - Mario Góngora-Blandón, Miguel Vargas-Lombardo:
State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming. 314-318 - Shay Gueron, Vlad Krasnov:
Simultaneous Hashing of Multiple Messages. 319-325 - Sandeep K. Sood:
Dynamic Identity Based Authentication Protocol for Two-Server Architecture. 326-334 - Alfredo Maesa, Fabio Garzia, Michele Scarpiniti, Roberto Cusani:
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models. 335-340
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.