default search action
Journal of Information Security and Applications, Volume 20
Volume 20, February 2015
- Zhili Sun, Haitham S. Cruickshank:
Guest Editorial: Security, privacy and trust in future networks and mobile computing. 1-2 - M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya:
An Enhanced and Secured RSA Key Generation Scheme (ESRKGS). 3-10 - Haleh Amintoosi, Salil S. Kanhere, Mohammad Allahbakhsh:
Trust-based privacy-aware participant selection in social participatory sensing. 11-25 - Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou:
Efficient suspicious URL filtering based on reputation. 26-36 - Sheetal Kalra, Sandeep K. Sood:
Advanced password based authentication scheme for wireless sensor networks. 37-46 - Pallipamu Venkateswara Rao, K. Thammi Reddy, P. Suresh Varma:
ASH-512: Design and implementation of cryptographic hash algorithm using co-ordinate geometry concepts. 47-60 - Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens:
Mining a high level access control policy in a network with multiple firewalls. 61-73 - Pranab Kumar Dhar, Tetsuya Shimamura:
Blind SVD-based audio watermarking using entropy and log-polar transformation. 74-83 - Blaz Markelj, Igor Bernik:
Safe use of mobile devices arises from knowing the threats. 84-89 - Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz:
A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks. 90-98
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.