


default search action
International Journal of Information Privacy, Security and Integrity, Volume 1
Volume 1, Number 1, 2011
- Ernie Brickell, Jiangtao Li:
Enhanced privacy ID from bilinear pairing for hardware authentication and attestation. 3-33 - Lei Jin, Hassan Takabi, James B. D. Joshi:
Analysing security and privacy issues of using e-mail address as identity. 34-58 - Amirreza Masoumzadeh, James Joshi:
Ontology-based access control for social network systems. 59-78 - Dalal Ahmed Al-Arayed, João Pedro Sousa:
A general model for trust management. 79-105 - Nancy R. Mead, Seiya Miyazaki, Justin Zhan:
Integrating privacy requirements considerations into a security requirements engineering method and tool. 106-126
Volume 1, Numbers 2/3, 2012
- Liqun Chen, Jiangtao Li:
VLR group signatures with indisputable exculpability and efficient revocation. 129-159 - Lee Fueng Yap, Takeshi Yashiro, Masahiro Bessho, Tomonori Usaka, M. Fahim Ferdous Khan, Noboru Koshizuka, Ken Sakamura:
SUCAS: smart-card-based secure user-centric attestation framework for location-based services. 160-183 - Michael D. Larsen
, Jennifer C. Huckett:
Multimethod synthetic data generation for confidentiality and measurement of disclosure risk. 184-204 - Claudio A. Ardagna
, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Minimising disclosure of client information in credential-based interactions. 205-233 - Shi-Cho Cha, Ya-Ping Fu, Ren-Ting Ku, Hao-Ping Lin:
On considering enforcement while establishing RFID privacy policies. 234-252 - Somayeh Taheri, Salke Hartung, Dieter Hogrefe:
RDIS: destination location privacy in MANETs. 253-277 - Zhibin Zhou, Dijiang Huang:
Gradual identity exposure using attribute-based encryption. 278-297
Volume 1, Number 4, 2013
- Alex Doyal, Justin Zhan:
Triple DoS: DDoS defence and traceback. 299-311 - Syed Taqi Ali
, B. B. Amberker:
A dynamic constant size attribute-based group signature scheme with attribute anonymity. 312-343 - Andre Abadie, Duminda Wijesekera:
An approach for risk assessment and mitigation in cognitive radio technologies. 344-359 - Asif Imran, Alim Ul Gias, Rayhanur Rahman, Kazi Sakib:
ProvIntSec: a provenance cognition blueprint ensuring integrity and security for real life open source cloud. 360-380 - Mehdi Sagheb-Tehrani, Arbi Ghazarian:
High development cost and software piracy: a study of motives. 381-402

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.