default search action
Journal of Internet Services and Information Security, Volume 3
Volume 3, Numbers 1/2, February 2013
- Baokang Zhao, Chunqing Wu, Qin Xin:
Guest Editorial: Special Issue on Advances in Internet Security and Technology. 1-4 - Kunwar Singh, C. Pandurangan, A. K. Banerjee:
Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext. 5-19 - Salim Allal, Saadi Boudjit:
Geocast Routing Protocols for VANETs: Survey and Geometry-Driven Scheme Proposal. 20-36 - Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang:
Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks. 37-48 - Marek Dabrowski, Justyna Gromada, Hassnaa Moustafa, Jacky Forestier:
A context-aware architecture for IPTV services personalization. 49-70 - Liang Sun, Fei Song, Dong Yang, Yajuan Qin:
DHR-CCN, Distributed Hierarchical Routing for Content Centric Network. 71-82 - Liang (Ben) Chen, Maria Prokopi:
Enabling Resource-Aware Ubiquitous Applications for Personal Cloud with a Pairing Device Framework. 83-100 - Denys A. Flores, Olga Angelopoulou, Richard J. Self:
An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together. 101-114 - S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:
Efficient Certificateless Online/Offline Signature with tight security. 115-137
Volume 3, Numbers 3/4, November 2013
- José Luis Hernández Ramos, Antonio J. Jara, Leandro Marín, Antonio F. Skarmeta:
Distributed Capability-based Access Control for the Internet of Things. 1-16 - Hyungdong Kim, YongJe Choi, Dooho Choi, JaeCheol Ha:
A New Exponentiation Algorithm Resistant to Combined Side Channel Attack. 17-27 - Junho Choi, Chang Choi, Byeongkyu Ko, Dongjin Choi, Pankoo Kim:
Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment. 28-37 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Identity Based Proxy Re-Encryption Scheme. 38-51 - Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Externalizing Behaviour for Analysing System Models. 52-62 - Hwan-taek Lee, Minkyu Park, Seong-je Cho:
Detection and prevention of LeNa Malware on Android. 63-71 - Ho-Seok Kang, Sung-Ryul Kim:
A New Logging-based IP Traceback Approach using Data Mining Techniques. 72-80 - Shigeyoshi Shima, Ayako Komatsu:
Guidelines for the Prevention of Internal Improprieties in Japanese Organization. 81-93 - Hyejoo Lee, Changho Seo, Sang-Uk Shin:
DRM Cloud Architecture and Service Scenario for Content Protection. 94-105 - Jun Ye, Xiaofeng Chen, Jianfeng Ma:
Constructing Verifiable Random Number in Finite Field. 106-115 - Yonglin Zhou, Qing-Shan Li, Qidi Miao, Kangbin Yim:
DGA-Based Botnet Detection Using DNS Traffic. 116-123 - Guowei Wu, Zuosong Liu, Lin Yao, Zhenzhen Xu, Wei Wang:
A Fuzzy-based Trust Management in WSNs. 124-135 - Jaein Kim, Youngjun Lee, Kyungroul Lee, Taeyoung Jung, Dmitry Volokhov, Kangbin Yim:
Vulnerability to Flash Controller for Secure USB Drives. 136-145
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.