default search action
International Journal of Information and Computer Security, Volume 15
Volume 15, Number 1, 2021
- Geetika Kovelamudi, Bryan Watson, Jun Zheng, Srinivas Mukkamala:
On the adoption of scramble keypad for unlocking PIN-protected smartphones. 1-17 - Aafaf Ouaddah, Badr Bellaj:
FairAccess2.0: a smart contract-based authorisation framework for enabling granular access control in IoT. 18-48 - Waqas Haider, Muhammad Wasif Nisar, Tanzila Saba, Muhammad Sharif, Raja Umair Haider, Nadeem Muhammad Bilal, Muhammad Attique Khan:
A complexity reduced and reliable integrity protection for large relational data over clouds. 49-66 - Ting-Fang Cheng, Ying-Chin Chen, Zhu-Dao Song, Ngoc-Tu Huynh, Jung-San Lee:
Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem. 67-87 - Jitesh Kumar Bhatia, Anand Singh Jalal:
Pixel-based hybrid copy move image forgery detection using Zernike moments and auto colour correlogram. 88-107
Volume 15, Numbers 2/3, 2021
- Gul Jabeen, Xi Yang, Ping Luo:
Vulnerability severity prediction model for software based on Markov chain. 109-140 - Dhruti Sharma, Devesh C. Jinwala:
Multi-writer multi-reader conjunctive keyword searchable encryption. 141-162 - Nour El Houda Senoussi, Abdelmalik Bachir, Abdelmadjid Bouabdallah:
On QoS-aware location privacy in mobile networks. 163-182 - Ismaila Adeniyi Kamil, Sunday Oyinlola Ogundoyin:
A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network. 183-215 - Fagen Song, Tinghuai Ma:
High utility differential privacy based on smooth sensitivity and individual ranking. 216-230 - Oladayo Olufemi Olakanmi:
A lightweight security and privacy-aware routing scheme for energy-constraint multi-hop wireless sensor networks. 231-253 - Boyu Li, Yanheng Liu, Minghai Wang, Geng Sun, Bin Li:
Local anatomy for personalised privacy protection. 254-271 - Shahrzad Sedaghat:
New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using SDN. 272-298 - Junaid Akram, Majid Mumtaz, Gul Jabeen, Ping Luo:
DroidMD: an efficient and scalable Android malware detection approach at source code level. 299-321
Volume 15, Number 4, 2021
- Ningning Du, Chongxu Chen:
Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing. 328-342 - Jianchao Zhao:
Research on network security defence based on big data clustering algorithms. 343-356 - Nooh Bany Muhammad, Aya Kandil:
Information protection of end users on the web: privacy issues and measures. 357-372 - Fengming Ma, Gang Sheng, Yuefeng Ma:
E-commerce process reengineering for customer privacy protection. 373-385 - Zhixing Lin, Jian Yu, Shunfa Liu:
The prediction of network security situation based on deep learning method. 386-399 - Parmod Kalia, Divya Bansal, Sanjeev Sofat:
A hybrid approach for preserving privacy for real estate data. 400-410
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.