


default search action
International Journal of Information and Computer Security, Volume 11
Volume 11, Number 1, 2019
- S. S. Manikandasaran, Lawrence Arockiam, P. D. Sheba Kezia Malarchelvi

:
MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage. 1-16 - Mohammad M. Rasheed

, Norita Md Norwawi, Osman Ghazali, Munadil K. Faaeq:
Detection algorithm for internet worms scanning that used user datagram protocol. 17-32 - Ouissem Ben Fredj:

SPHERES: an efficient server-side web application protection system. 33-60 - Kamel Mohamed Faraoun:

A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields. 61-82 - Xiaoming Hu, Huajie Xu, Jian Wang, WenAn Tan, Yinchun Yang:

A generic construction of identity-based proxy signature scheme in the standard model. 83-100
Volume 11, Number 2, 2019
- Sheng-dong Mu, Yixiang Tian, Yiwei Luo:

A study of the internet financial interest rate risk evaluation index system in cloud computing. 103-119 - He Xu, Weiwei Shen, Peng Li, Keith Mayes, Ruchuan Wang, Dashen Li, Shengxiang Yang:

Novel implementation of defence strategy of relay attack based on cloud in RFID systems. 120-144 - Su Yang, Shen Junwei, Wang Wei:

Reconfigurable design and implementation of nonlinear Boolean function for cloud computing security platform. 145-159 - Haixing Wang, Guiping Xiao, Zhen Wei, Tao Hai:

Network optimisation for improving security and safety level of dangerous goods transportation based on cloud computing. 160-177 - Xiao Zhang, Shengli Liu, Shuai Han:

Proofs of retrievability from linearly homomorphic structure-preserving signatures. 178-202
Volume 11, Number 3, 2019
- Hedieh Sajedi

:
An ensemble algorithm for discovery of malicious web pages. 203-213 - Aniruddha Bhattacharjya

, Xiaofeng Zhong
, Jing Wang, Xing Li:
On mapping of address and port using translation. 214-232 - Aarti Amod Agarkar

, Himanshu Agrawal:
Lightweight R-LWE-based privacy preservation scheme for smart grid network. 233-254 - Jaryn Shen, Qingkai Zeng:

CSPS: catchy short passwords making offline and online attacks impossible. 255-274 - V. Keerthika, Nandagopal Malarvizhi

:
Mitigate black hole attack using bee optimised weighted trust with AODV in MANET. 275-288 - Adam J. Brown, Todd R. Andel

:
What's in your honeypot: a privacy compliance perspective. 289-309
Volume 11, Numbers 4/5, 2019
- Ben Charhi Youssef, Mannane Nada, Boubker Regragui:

Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing. 315-331 - Burhan Ul Islam Khan

, Rashidah Funke Olanrewaju
, Farhat Anwar, Roohie Naaz Mir, Athaur Rahman Najeeb:
A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. 332-354 - Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane:

An efficient authentication and key agreement scheme for e-health applications in the context of internet of things. 355-390 - Jiaying Li, Baowen Zhang:

An ontology-based approach to improve access policy administration of attribute-based access control. 391-412 - Mohammed Amine Yagoub, Okba Kazar

, Mounir Beggas:
A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment. 413-430 - Ahmed A. Elngar:

An efficient user authentication model for IOT-based healthcare environment. 431-446 - B. S. Kiruthika Devi

, T. Subbulakshmi
:
Cloud-based DDoS attack detection and defence system using statistical approach. 447-475 - T. N. Nisha

, Dhanya Pramod
:
Sequential pattern analysis for event-based intrusion detection. 476-492 - Kirti Sharma, Shobha Bhatt:

SQL injection attacks - a systematic review. 493-509 - Isunuri Bala Venkateswarlu

, Jagadeesh Kakarla:
Password security by encryption using an extended ADFGVX cipher. 510-523
Volume 11, Number 6, 2019
- Henry Carter

, Patrick Traynor:
Outsourcing computation for private function evaluation. 525-561 - Xiaolei Wang, Yuexiang Yang:

PrivacyContext: identifying malicious mobile privacy leak using program context. 562-584 - Rakesh Ahuja

, Sarabjeet Singh Bedi:
Video watermarking scheme based on IDR frames using MPEG-2 structure. 585-603 - Mao Yingying, Yuan Hao:

Study on data fuzzy breakpoint detection in massive dynamic data flow. 604-620 - Ja'afer Al-Saraireh

:
A novel approach for query over encrypted data in database. 621-636 - M. Revanesh, V. Sridhar, John M. Acken:

CB-ALCA: a cluster-based adaptive lightweight cryptographic algorithm for secure routing in wireless sensor networks. 637-662

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














