


default search action
International Journal of Information and Computer Security, Volume 17
Volume 17, Numbers 1/2, 2022
- G. Prabu Kanna, V. Vasudevan:
An improved privacy aware secure multi-cloud model with proliferate ElGamal encryption for big data storage. 1-20 - Rangana De Silva, Iranga Navaratna, Malitha Kumarasiri, Janaka Alawatugoda
, Chuah Chai Wen
:
On power analysis attacks against hardware stream ciphers. 21-35 - Mohammed Riyadh Abdmeziem
:
Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode. 36-56 - Scott Brookes, Robert Denz, Martin Osterloh, Stephen Taylor:
ExOShim: preventing memory disclosure using execute-only kernel code. 57-82 - B. Yamini, R. Sabitha:
Image steganalysis: real-time adaptive colour image segmentation for hidden message retrieval and Matthew's correlation coefficient calculation. 83-103 - Hongfeng Zhu, Xintong Wang, Yeh-Cheng Chen, Xueying Wang:
Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol. 104-118 - Taghreed AlKhodaidi
, Adnan Gutub
:
Scalable shares generation to increase participants of counting-based secret sharing technique. 119-146 - Omar Al-Ibrahim
, Majid Malaika:
Botract: abusing smart contracts and blockchain for botnet command and control. 147-163 - Shozab Khurshid, Avinash K. Shrivastava, Javaid Iqbal:
Generalised multi release framework for fault determination with fault reduction factor. 164-178 - Toni Grzinic, Eduardo Blázquez González:
Methods for automatic malware analysis and classification: a survey. 179-203 - Monika Shah
:
Detecting over-claim permissions and recognising dangerous permission in Android apps. 204-218
Volume 17, Numbers 3/4, 2022
- Jiwoong Kang, Jaehyun Park:
SoC-based abnormal ethernet packet detector with automatic rule-set generator. 219-230 - Youssef Taouil, El Bachir Ameur
, Amine Benhfid, Rachid Harba, Hassan Douzi:
Adaptive steganographic scheme using a variable matrix embedding. 231-260 - Youcef Ould Yahia, Samia Bouzefrane, Hanifa Boucheneb, Soumya Banerjee:
A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment. 261-284 - Yavar Safaei Mehrabani, Roghayeh Ataie, Mohammad Hossein Shafiabadi, Abolghasem Ghasempour:
Design and implementation of an ASIP for SHA-3 hash algorithm. 285-309 - Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen, Yu-Xi Hu, Tsu-Yang Wu:
Simple multi-scale human abnormal behaviour detection based on video. 310-320 - Yujie Wan, Baoxiang Du
:
A new image encryption algorithm based on cascaded chaos and Arnold transform. 321-331 - Ahmad Azab:
The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows. 332-350 - Zhixin Zeng, Liang Chang, Yi-Ning Liu:
A fault tolerance data aggregation scheme for fog computing. 351-364 - Khanh-Huu-The Dam
, Tayssir Touili:
Extracting malicious behaviours. 365-404 - Sumit Kumar Debnath
, Nibedita Kundu, Tanmay Choudhury:
Efficient post-quantum private set-intersection protocol. 405-423 - Bin Wu, Xiao Yi, Dongning Zhao:
A node screening algorithm for wireless sensor network based on threshold measurement. 424-437

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.