default search action
International Journal of Information and Computer Security, Volume 5
Volume 5, Number 1, 2012
- Zhongqiu Xu, Liangju Li, Haibo Gao:
Bandwidth efficient buyer-seller watermarking protocol. 1-10 - Haichang Gao, Licheng Ma, Wei Jia, Fei Ye:
Multiple password interference in graphical passwords. 11-27 - Sachin Mehta, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy:
Tampering resistant self recoverable watermarking method using error correction codes. 28-47 - Vimalathithan Subramanian, Remzi Seker, Srini Ramaswamy, Rathinasamy B. Lenin:
PCIEF: a policy conflict identification and evaluation framework. 48-67 - Mustapha Hedabou:
Securing pairing-based cryptography on smartcards. 68-76
Volume 5, Number 2, 2012
- Danilo Valeros Bernardo:
Security risk assessment: toward a comprehensive practical risk management. 77-104 - Somayeh Naderi Vesal, Mohammad Fathian:
Efficient and secure credit card payment protocol for mobile devices. 105-114 - Jonathan Pan, Chun Che Fung:
An agent-based model to simulate coordinated response to malware outbreak within an organisation. 115-131 - Md. Iftekhar Salam, Hoon-Jae Lee:
On the algebraic attack against summation type keystream generators. 132-149
Volume 5, Number 3, 2013
- Juggapong Natwichai, Xue Li, Asanee Kawtrakul:
Incremental processing and indexing for (k, e)-anonymisation. 151-170 - Rkia Aouinatou, Mostafa Belkasmi:
On the conventional public key in identification-based encryption: the case of RSA. 171-201 - V. Santhi, Arunkumar Thangavelu, Pachiyappan Arulmozhivarman:
Adaptive visible watermarking in Hadamard domain for digital images. 202-223 - Manish Mahajan, Navdeep Kaur:
Steganography in coloured images using wavelet domain-based saliency map. 224-235 - Qasem Abu Al-Haija, Ahmad Al Badawi:
Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2N) using parallel multipliers and architectures. 236-250
Volume 5, Number 4, 2013
- Lawrence Teo, Gail-Joon Ahn:
Extensible policy framework for heterogeneous network environments. 251-274 - Anshu Tripathi, Umesh Kumar Singh:
Evaluation of severity index of vulnerability categories. 275-289 - Mahmood Al-khassaweneh, Shefa Tawalbeh:
A value transformation and random permutation-based coloured image encryption technique. 290-300 - Anup C. Sharma, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney, William L. Sousan:
A social dimensional cyber threat model with formal concept analysis and fact-proposition inference. 301-333 - Zhanshan Ma:
First passage time and first passage percolation models for analysing network resilience and effective strategies in strategic information warfare research: a brief survey and perspective. 334-358
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.