default search action
International Journal of Information and Computer Security, Volume 8
Volume 8, Number 1, 2016
- Anoop Jyoti Sahoo, Rajesh Kumar Tiwari:
A novel approach for hiding secret data in program files. 1-10 - Sandeep K. Sood:
Advanced dynamic identity-based authentication protocol using smart card. 11-33 - Amit Phadikar, Poulami Jana, Baisakhi Sur Phadikar, Goutam Kumar Maity:
Reversible watermarking using channel coding and lifting for cultural heritage and medical image. 34-54 - T. Sahayini, M. S. K. Manikandan:
Enhancing the security of modern ICT systems with multimodal biometric cryptosystem and continuous user authentication. 55-71 - Christian Praher, Michael Sonntag:
Applicability of keystroke dynamics as a biometric security feature for mobile touchscreen devices with virtualised keyboards. 72-91
Volume 8, Number 2, 2016
- J. Gnanambigai, N. Rengarajan:
A novel approach to enhance the network lifetime for hybrid routing protocol. 95-106 - Yasmina Ghebghoub, Saliha Oukid, Omar Boussaid:
An MDA approach to secure access to data on cloud using implicit security. 107-120 - Farah-Sarah Ouada, Mawloud Omar, Abdelmadjid Bouabdallah, Abdelkamel Tari:
Lightweight identity-based authentication protocol for wireless sensor networks. 121-138 - Pramod T. C, N. R. Sunitha:
Key pre-distribution schemes to support various architectural deployment models in WSN. 139-157 - RajaSekhar Rajaboina, P. Chenna Reddy, Raja Ashok Kumar, Nangil Venkatramana:
Performance comparison of TCP, UDP and TFRC in static wireless environment. 158-180 - Kavitha Ammayappan:
Formally verified TSM centric privacy preserving NFC mobile payment framework and protocol. 181-204
Volume 8, Number 3, 2016
- Assia Beloucif, Oussama Noui, Lemnouar Noui:
Design of a tweakable image encryption algorithm using chaos-based schema. 205-220 - Fuad A. Ghaleb, Anazida Zainal, Murad A. Rassam:
Mobility information estimation algorithm using Kalman-filter for vehicular ad hoc networks. 221-240 - Jyothsna Veeramreddy, Rama Prasad V. Vaddella:
Anomaly-based network intrusion detection through assessing feature association impact scale. 241-257 - M. Swagath Babu, G. Idayachandran, A. Rajesh, T. Shankar, Rangaswamy Nakkeeran:
Investigation on defected ground-plane structures to improve isolation and correlation in multi-band MIMO antenna. 258-271 - N. Raghu Kisore:
A qualitative framework for evaluating buffer overflow protection mechanisms. 272-307
Volume 8, Number 4, 2016
- Anshu Tripathi, Umesh Kumar Singh:
Application of quantitative security measurement model for prioritisation of vulnerability mitigation: a real case study. 309-329 - Sunita Vikrant Dhavale, Rajendra S. Deodhar, Debasish Pradhan, L. M. Patnaik:
A robust zero watermarking algorithm for stereo audio signals. 330-346 - J. Gayathri, S. Subashini:
A survey on security and efficiency issues in chaotic image encryption. 347-381 - Shengzhi Zhang, Xiaoqi Jia, Peng Liu:
Towards service continuity for transactional applications via diverse device drivers. 382-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.