default search action
International Journal of Information Security and Privacy, Volume 12
Volume 12, Number 1, 2018
- Ranjeet Kumar Singh, Dilip Kumar Shaw:
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security. 1-12 - Gautam Kumar, Hemraj Saini:
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification. 13-28 - Arun Malik, Babita Pandey:
CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET. 29-41 - Geetanjali Rathee, Hemraj Saini:
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN. 42-52 - Gulshan Kumar, Rahul Saha, Mandeep Singh, Mritunjay Kumar Rai:
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. 53-62 - Rajeev Sobti, G. Geetha:
Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex-M4 Processor. 63-73 - Rajni Mohana:
A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation. 74-88 - Puneet Kumar Kaushal, Rajeev Sobti:
Breaching Security of Full Round Tiny Encryption Algorithm. 89-98
Volume 12, Number 2, 2018
- Malay Kumar, Manu Vardhan:
Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis. 1-25 - Geetanjali Rathee, Hemraj Saini:
Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN. 26-37 - Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati:
A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks. 38-45 - Muzzammil Hussain, Neha Kaliya:
An Improvised Framework for Privacy Preservation in IoT. 46-63
Volume 12, Number 3, 2018
- Noushin Ashrafi, Jean-Pierre Kuilboer:
A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia. 1-15 - Bouchra Echandouri, Fouzia Omary, Fatima Ezzahra Ziani, Anas Sadak:
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm. 16-26 - Hridoy Jyoti Mahanta, Ajoy Kumar Khan:
Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem. 27-41 - S. Geetha, P. Punithavathi, A. Magnus Infanteena, Siva S. Sivatha Sindhu:
A Literature Review on Image Encryption Techniques. 42-83 - Venkata Udaya Sameer, Ruchira Naskar:
Blind Image Source Device Identification: Practicality and Challenges. 84-99 - Benjamin Stark, Heiko Gewald, Heinrich Lautenbacher, Ulrich Haase, Siegmar Ruff:
Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data. 100-122 - B. S. Kiruthika Devi, T. Subbulakshmi, K. V. Mahesh Babu:
A Survey of Security Models Using Effective Moving Target Defenses. 123-140 - S. Vijayarani Mohan, Tamilarasi Angamuthu:
Association Rule Hiding in Privacy Preserving Data Mining. 141-163
Volume 12, Number 4, 2018
- Martin Konan, Wenyong Wang:
Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω). 1-23 - Atefeh Khazaei, Mohammad Ghasemzadeh, Christoph Meinel:
VuWaDB: A Vulnerability Workaround Database. 24-34 - Rohit M. Thanki, Komal R. Borisagar:
Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking. 35-53 - Charifa Hanin, Fouzia Omary, Souad El Bernoussi, Khadija Achkoun, Bouchra Echandouri:
A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO). 54-67 - Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu:
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain. 68-81 - Patryk Szewczyk, Krishnun Sansurooah, Patricia A. H. Williams:
An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards. 82-97
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.