![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Information and Computer Security, Volume 11
Volume 11, Number 1, 2019
- S. S. Manikandasaran, Lawrence Arockiam, P. D. Sheba Kezia Malarchelvi:
MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage. 1-16 - Mohammad M. Rasheed
, Norita Md Norwawi, Osman Ghazali, Munadil K. Faaeq:
Detection algorithm for internet worms scanning that used user datagram protocol. 17-32 - Ouissem Ben Fredj:
SPHERES: an efficient server-side web application protection system. 33-60 - Kamel Mohamed Faraoun:
A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields. 61-82 - Xiaoming Hu, Huajie Xu, Jian Wang, WenAn Tan, Yinchun Yang:
A generic construction of identity-based proxy signature scheme in the standard model. 83-100
Volume 11, Number 2, 2019
- Sheng-dong Mu, Yixiang Tian, Yiwei Luo:
A study of the internet financial interest rate risk evaluation index system in cloud computing. 103-119 - He Xu, Weiwei Shen, Peng Li, Keith Mayes, Ruchuan Wang, Dashen Li, Shengxiang Yang:
Novel implementation of defence strategy of relay attack based on cloud in RFID systems. 120-144 - Su Yang, Shen Junwei, Wang Wei:
Reconfigurable design and implementation of nonlinear Boolean function for cloud computing security platform. 145-159 - Haixing Wang, Guiping Xiao, Zhen Wei, Tao Hai:
Network optimisation for improving security and safety level of dangerous goods transportation based on cloud computing. 160-177 - Xiao Zhang, Shengli Liu, Shuai Han:
Proofs of retrievability from linearly homomorphic structure-preserving signatures. 178-202
Volume 11, Number 3, 2019
- Hedieh Sajedi
:
An ensemble algorithm for discovery of malicious web pages. 203-213 - Aniruddha Bhattacharjya
, Xiaofeng Zhong, Jing Wang, Xing Li:
On mapping of address and port using translation. 214-232 - Aarti Amod Agarkar
, Himanshu Agrawal:
Lightweight R-LWE-based privacy preservation scheme for smart grid network. 233-254 - Jaryn Shen, Qingkai Zeng:
CSPS: catchy short passwords making offline and online attacks impossible. 255-274 - V. Keerthika, Nandagopal Malarvizhi
:
Mitigate black hole attack using bee optimised weighted trust with AODV in MANET. 275-288 - Adam J. Brown, Todd R. Andel
:
What's in your honeypot: a privacy compliance perspective. 289-309
Volume 11, Numbers 4/5, 2019
- Ben Charhi Youssef, Mannane Nada, Boubker Regragui:
Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing. 315-331 - Burhan Ul Islam Khan
, Rashidah Funke Olanrewaju
, Farhat Anwar, Roohie Naaz Mir, Athaur Rahman Najeeb:
A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. 332-354 - Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane:
An efficient authentication and key agreement scheme for e-health applications in the context of internet of things. 355-390 - Jiaying Li, Baowen Zhang:
An ontology-based approach to improve access policy administration of attribute-based access control. 391-412 - Mohammed Amine Yagoub, Okba Kazar
, Mounir Beggas:
A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment. 413-430 - Ahmed A. Elngar:
An efficient user authentication model for IOT-based healthcare environment. 431-446 - B. S. Kiruthika Devi
, T. Subbulakshmi
:
Cloud-based DDoS attack detection and defence system using statistical approach. 447-475 - T. N. Nisha
, Dhanya Pramod
:
Sequential pattern analysis for event-based intrusion detection. 476-492 - Kirti Sharma, Shobha Bhatt:
SQL injection attacks - a systematic review. 493-509 - Isunuri Bala Venkateswarlu
, Jagadeesh Kakarla:
Password security by encryption using an extended ADFGVX cipher. 510-523
Volume 11, Number 6, 2019
- Henry Carter
, Patrick Traynor:
Outsourcing computation for private function evaluation. 525-561 - Xiaolei Wang, Yuexiang Yang:
PrivacyContext: identifying malicious mobile privacy leak using program context. 562-584 - Rakesh Ahuja
, Sarabjeet Singh Bedi:
Video watermarking scheme based on IDR frames using MPEG-2 structure. 585-603 - Mao Yingying, Yuan Hao:
Study on data fuzzy breakpoint detection in massive dynamic data flow. 604-620 - Ja'afer Al-Saraireh
:
A novel approach for query over encrypted data in database. 621-636 - M. Revanesh, V. Sridhar, John M. Acken:
CB-ALCA: a cluster-based adaptive lightweight cryptographic algorithm for secure routing in wireless sensor networks. 637-662
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.