


default search action
Journal of Internet Services and Information Security, Volume 2
Volume 2, Numbers 1/2, February 2012
- Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez:

Towards secure mobile P2P applications using JXME. 1-21 - Karl Andersson:

Interworking Techniques and Architectures for Heterogeneous Wireless Networks. 22-48 - Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang

, Jin Li, Hui Zhu:
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. 49-58 - Charles J. Zinsmeyer, Turgay Korkmaz:

A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques. 59-72 - Manuel Mazzara, Nicola Dragoni, Mu Zhou:

Implementing Workflow Reconfiguration in WS-BPEL. 73-92 - Atsuko Miyaji, Mohammad Shahriar Rahman:

Private Two-Party Set Intersection Protocol in Rational Model. 93-104 - João Carneiro, João Laranjeira, Goreti Marreiros, Carlos Filipe Freitas, Ricardo Santos:

A Context-aware Model to Support Ubiquitous Group Decision Making. 105-118 - Sang Min Lee, Dong Seong Kim, Jong Sou Park:

A Survey and Taxonomy of Lightweight Intrusion Detection Systems. 119-131
Volume 2, Numbers 3/4, November 2012
- Kangbin Yim, Yoshiaki Hori:

Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2). 1-2 - Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:

Securing the "Bring Your Own Device" Policy. 3-17 - Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai:

Detecting Information Leakage via a HTTP Request Based on the Edit Distance. 18-28 - Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi:

An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks. 29-42 - Ho-Seok Kang, Sung-Ryul Kim:

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System. 43-53 - Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, Pankoo Kim:

A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments. 54-64 - Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:

A Study on Design and Implementation of E-Discovery Service based on Cloud Computing. 65-76 - S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:

Efficient Certificateless Online/Offline Signature. 77-92 - Jeong-Soo Park, KiSeok Bae, YongJe Choi, Dooho Choi, JaeCheol Ha:

A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output. 93-109 - Zhiwei Wang, Guozi Sun, Danwei Chen:

Short signature from factoring assumption in the standard model. 110-117 - Kunwar Singh, C. Pandurangan, A. K. Banerjee:

Lattice Forward-Secure Identity Based Encryption Scheme. 118-128 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:

Strategic Information Splitting Using Biometric Patterns. 129-133 - Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim:

A Brief Survey on Rootkit Techniques in Malicious Codes. 134-147 - Marek R. Ogiela, Lidia Ogiela:

Personal Identification Based on Cognitive Analysis of Selected Medical Visualization. 148-153

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














