


default search action
International Journal of Information and Computer Security, Volume 4
Volume 4, Number 1, 2010
- Che Wun Chiou, Fu-Hua Chou, Yun-Chi Yeh:

Speeding up Euclid's GCD algorithm with no magnitude comparisons. 1-8 - Shiyan Hu

:
A secure partition-based document image watermarking scheme. 9-23 - Amit K. Awasthi

:
Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection. 24-29 - Ping Wang, Lei Wu, Ryan Cunningham, Cliff C. Zou:

Honeypot detection in advanced botnet attacks. 30-51 - Li Qin, Vijayalakshmi Atluri

:
Semantics-aware security policy specification for the semantic web data. 52-75 - Zhanshan (Sam) Ma:

An integrated approach to network intrusion detection with block clustering analysis, generalised logistic regression and linear discriminant analysis. 76-97
Volume 4, Number 2, 2010
- Philip Woodall

, Pearl Brereton:
A systematic literature review of inference strategies. 99-117 - Vijayalakshmi Atluri

, Qi Guo, Heechang Shin, Jaideep Vaidya:
A unified index structure for efficient enforcement of spatiotemporal authorisations. 118-151 - Defa Hu, Qiaoliang Li:

Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer. 152-163 - Abdelrahman Desoky:

Comprehensive linguistic steganography survey. 164-197
Volume 4, Number 3, 2011
- P. Karthigaikumar

, K. Baskaran
, K. Jaraline Kirubavathy:
Low power implementation of audio watermarking using chirp spread spectrum technique. 199-214 - Jing Jin, Gail-Joon Ahn

:
Assured resource sharing in Grid environments. 215-233 - Abdelrahman Desoky:

Sumstega: summarisation-based steganography methodology. 234-263 - Oladayo Olufemi Olakanmi:

RC42's innovative way for data security in wireless data communication. 264-275 - Zhanshan (Sam) Ma:

Frailty modelling for risk analysis in network security and survivability. 276-294
Volume 4, Number 4, 2011
- Julian L. Rrushi:

Anomaly detection via statistical learning in industrial communication networks. 295-315 - Defa Hu, Juanjuan Luo:

Digital fingerprinting: problems and solutions. 316-331 - Mahmood Al-khassaweneh

:
Image encryption method based on using least square error techniques at the decryption stage. 332-344 - Adesina S. Sodiya, Adenrele Afolorunso

, Omoniyi Paul Ogunderu:
A countermeasure algorithm for password guessing attacks. 345-364 - Khaled Gaaloul, Henderik Alex Proper

, Ehtesham Zahoor, François Charoy, Claude Godart:
A logical framework for reasoning about delegation policies in workflow management systems. 365-388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














