


default search action
Journal of Information Security and Applications, Volume 34
Volumes 34, Part 1, June 2017
- Karen Renaud
, Stephen Flowerday:
Human-centred cyber security. 1 - Andrew Hoskins
:
Risk media and the end of anonymity. 2-7 - Paul Gerber, Melanie Volkamer, Karen Renaud
:
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. 8-26 - Luigi Lo Iacono, Peter Leo Gorski
, Josephine Grosse, Nils Gruschka:
Signalling over-privileged mobile applications using passive security indicators. 27-33 - Lydia Kraus, Ina Wechsung, Sebastian Möller
:
Psychological needs as motivators for security and privacy actions on smartphones. 34-45 - Duy Dang-Pham
, Siddhi Pittayachawan
, Vince Bruno
:
Exploring behavioral information security networks in an organizational context: An empirical case study. 46-62 - Brian Greaves, Marijke Coetzee
:
Access control for secure information sharing in smart content spaces. 63-75 - Karen Renaud, Stephen Flowerday:
Contemplating human-centred security & privacy research: Suggesting future directions. 76-81
Volumes 34, Part 2, June 2017
- Keita Emura
, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
:
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation. 84-91 - Firas Al Khalil
, Alban Gabillon
, Patrick Capolsini:
A comprehensive view on quantity based aggregation for cadastral databases. 92-107 - Xiaonan Wang, Yi Mu:
Communication security and privacy support in 6LoWPAN. 108-119 - Vasileios Anastopoulos, Sokratis K. Katsikas:
A structured methodology for deploying log management in WANs. 120-132 - Wei-Liang Tai
, Ya-Fen Chang, Wei-Han Li:
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. 133-141 - Milad Yousefi Valandar
, Peyman Ayubi
, Milad Jafari Barani
:
A new transform domain steganography based on modified logistic chaotic map for color images. 142-151 - Kevin I. Jones, Helge Janicke
, Christian Facchi
, Leandros A. Maglaras
:
Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security". 152 - Manuel Cheminod, Luca Durante
, Lucia Seno, Adriano Valenzano:
Detection of attacks based on known vulnerabilities in industrial networked systems. 153-165 - Giuseppe Settanni, Florian Skopik
, Yegor Shovgenya, Roman Fiedler, Mark Carolan, Damien Conroy, Konstantin Böttinger, Mark Gall, Gerd Brost, Christophe Ponchel, Mirko Haustein, Helmut Kaufmann, Klaus Theuerkauf, Pia Olli:
A collaborative cyber incident management system for European interconnected critical infrastructures. 166-182 - Ivo Friedberg
, Kieran McLaughlin, Paul Smith
, David M. Laverty
, Sakir Sezer:
STPA-SafeSec: Safety and security analysis for cyber-physical systems. 183-196 - Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
A security evaluation of IEC 62351. 197-204 - Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia:
Special issue on Secure Computation on Encrypted Data. 205-206 - Johannes Schneider, Bin Lu:
Secure numerical and logical multi party operations. 207-217 - Menachem Domb, Elisheva Bonchek-Dokow, Guy Leshem:
Lightweight adaptive Random-Forest for IoT rule generation and execution. 218-224 - Jian Xu, Yewen Cao, Deqiang Wang:
Generalised regenerating codes for securing distributed storage systems against eavesdropping. 225-232 - Khalil Hariss, Hassan Noura
, Abed Ellatif Samhat
:
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications. 233-242 - Mahmoud F. Abd Elzaher, Mohamed Shalaby
, Yasser M. Kamal, Salwa El-Ramly:
Securing digital voice communication using non-autonomous modulated chaotic signal. 243-250 - Lirong Qiu, Xin Sun, Xishun Zhao:
Realizing correlated equilibrium by secure computation. 251-254 - Parwinder Kaur Dhillon
, Sheetal Kalra
:
A lightweight biometrics based remote user authentication scheme for IoT services. 255-270 - Duncan Smith
:
Secure pseudonymisation for privacy-preserving probabilistic record linkage. 271-279 - Zengpeng Li
, Chunguang Ma, Ding Wang
, Gang Du:
Toward single-server private information retrieval protocol via learning with errors. 280-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.