default search action
International Journal of Information and Computer Security, Volume 7
Volume 7, Number 1, 2015
- Kevin Curran, Vivian Maynes, Declan Harkin:
Mobile device security. 1-13 - Haixia Xu, Bao Li, Qixiang Mei:
Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes. 14-38 - Lei Niu, Changqing Zhang, Qi Xia, Yong Yu:
Advanced security analysis of a signature scheme with message recovery. 39-48 - Narayanan Prasanth, Kannan Balasubramanian:
Performance analysis of buffered crossbar switch scheduling algorithms. 49-63 - Olayemi M. Olaniyi, Oladiran T. Arulogun, Oluwasayo E. Omidiora, Oladotun Olusola Okediran:
Implementing generic security requirements in e-voting using modified stegano-cryptographic approach. 64-90
Volume 7, Numbers 2/3/4, 2015
- Rakesh Kumar, Geetu Mahajan:
A novel framework for secure file transmission using modified AES and MD5 algorithms. 91-112 - Raphaël Khoury, Nadia Tawbi:
Equivalence-preserving corrective enforcement of security properties. 113-139 - Peng Wang, Chinya V. Ravishankar:
Hierarchical policy delegation in multiple-authority ABE. 140-159 - William R. Mahoney:
Modifications to GCC for increased software privacy. 160-176 - M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya:
Secure file storage and retrieval in cloud. 177-195 - Ratnakirti Roy, Shabnam Samima, Suvamoy Changder:
A map-based image steganography scheme for RGB images. 196-215 - Georgios Mantas, Natalia Stakhanova, Hugo Gonzalez, Hossein Hadian Jazi, Ali A. Ghorbani:
Application-layer denial of service attacks: taxonomy and survey. 216-239 - Jonathan Pan:
Data leakage triage: quantitative measure of effectiveness of containment plan. 240-254
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.