default search action
International Journal of Information Privacy, Security and Integrity, Volume 4
Volume 4, Number 1, 2019
- Vikas Tiwari, Ajeet Singh, Appala Naidu Tentu:
Differential cryptanalysis on DES cryptosystem up to eight rounds. 1-29 - Hanane Saidi, Driss Gretete, Adnane Addaim:
Survey: secure opportunistic routing protocols in wireless networks. 30-48 - El Arbi Abdellaoui Alaoui, Mustapha El Moudden:
Security analysis for intelligent urban freight transport. 49-64 - Asmaa Berdigh, Kenza Oufaska, Khalid El Yassini:
Connected car and CO2 emission overview: solutions, challenges and opportunities. 65-78
Volume 4, Number 2, 2019
- Rachid Rimani, Naima Hadj-Said, Adda Ali-Pacha:
Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key. 79-93 - Chonlathip Aswakan:
Live event creation and management: case of King Bhumibol Adulyadej mourning event. 94-101 - Jirayut Monjagapate, Nakorn Rungkittanasan:
The study of acceptance Thai LGBTQs in Bangkok: analysis of attitudes from Gen-Z people. 102-114 - Albert Kofi Kwansah Ansah, Daniel Adu-Gyamfi, Stephen Anokye:
BiSign: pairing-based anonymity in bitcoin cryptocurrency. 115-133 - Michael Mireku Kwakye:
Privacy-preservation in data pre-processing for web usage mining. 134-152
Volume 4, Number 3, 2020
- Leila Benarous, Benamar Kadri:
Hybrid pseudonym change strategy for location privacy in VANET: protecting location privacy in VANET. 153-169 - Subrata Bose:
Commutative encryption: an answer to privacy protected query processing of multi data sources. 170-202 - Jyoti Lamba, V. Ch. Venkaiah:
Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme. 203-225 - Chia-Sung Yen:
The influence of product placement on TV news and journalists self-evaluation of professionalism and private policy. 226-236
Volume 4, Number 4, 2020
- Wesam Almobaideen, Hebatullah Jarboua, Khair Eddin Sabri:
Searchable encryption architectures: survey of the literature and proposing a unified architecture. 237-260 - Dirk Pawlaszczyk, Jannik Weber, Ralf Zimmermann, Christian Hummert:
Android apps and advertising networks - a survey on data privacy. 261-275 - Sarandis Mitropoulos, Antonios Gouglidis, Vasileios Giotsas:
A categorisation of policy conflicts in distributed systems and network management. 276-295 - Lucien Ngalamou, Harmony L. Schmidbauer:
Combating and perpetuating bias: the relationship between bias and computer science. 296-313 - Ronald B. Larson:
Privacy concerns and actions to reduce privacy risks. 314-333
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.