default search action
Journal of Internet Services and Information Security, Volume 8
Volume 8, Number 1, February 2018
- Ilsun You:
Letter from the Editor-in-Chief. 1 - Chundong Wang, Likun Zhu, Liangyi Gong, Zhentang Zhao, Lei Yang, Zheli Liu, Xiaochun Cheng:
Channel State Information-Based Detection of Sybil Attacks in Wireless Networks. 2-17 - Zheng-Yang Ai, Fei Song, Xi Wang:
Combining SDN and ICN for Network Survivability Improvement. 18-30 - Zhiwei Yan, Guanggang Geng, Hidenori Nakazato, Yong-Jin Park:
Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI). 31-45 - R. Vidhya, M. Brindha:
A novel Dynamic Key based chaotic image encryption. 46-55
Volume 8, Number 2, May 2018
- Chi-Sheng Shih, Jyun-Jhe Chou, Kwei-Jay Lin:
WuKong: Secure Run-Time environment and data-driven IoT applications for Smart Cities and Smart Buildings. 1-17 - Qiang Zhi, Shuichiro Yamamoto, Shuji Morisaki:
IMSA - Intra Model Security Assurance. 18-32 - Fulvio Valenza, Antonio Lioy:
User-oriented Network Security Policy Specification. 33-47 - Takshi Gupta, Gaurav Choudhary, Vishal Sharma:
A Survey on the Security of Pervasive Online Social Networks (POSNs). 48-86
Volume 8, Number 3, August 2018
- Fabio Arena, Giovanni Pau, Mario Collotta:
A survey on driverless vehicles: from their diffusion to security features. 1-19 - Tatsuya Ohyanagi, Tomoyuki Ishida:
Implementation of an Integrated Common Platform for Zoo Operations. 20-39 - Borja Bordel, Ramón Alcarria:
Physical Unclonable Functions based on silicon micro-ring resonators for secure signature delegation in Wireless Sensor Networks. 40-53 - Igor V. Kotenko, Igor Saenko, Alexander Branitskiy:
Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring. 54-63
Volume 8, Number 4, November 2018
- Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Achieving Strong Security and Member Registration for Lattice-based Group Signature Scheme with Verifier-local Revocation. 1-15 - Paventhan Vivekanandan:
A Type-based Formal Specification for Cryptographic Protocols. 16-36 - Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto:
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption. 37-56 - Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa:
Lattice-Based Simulatable VRFs: Challenges and Future Directions. 57-69
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.