


default search action
International Journal of Information Security and Privacy, Volume 10
Volume 10, Number 1, 2016
- Amine Rahmani
, Abdelmalek Amine
, Reda Mohamed Hamou
:
Combination of Access Control and De-Identification for Privacy Preserving in Big Data. 1-27 - Colin Lai, Hung-Lian Tang, J. Michael Tarn, Sock H. Chung:
The Compliance of IT Control and Governance: A Case of Macao Gaming Industry. 28-44 - Pawan R. Bhaladhare, Devesh C. Jinwala
:
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining. 45-65
Volume 10, Number 2, 2016
- Aftab Ahmad:
A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI). 1-10 - Rituparna Das
:
Are the Payments System and e-Banking in India Safer than in other SAARC Members? 11-25 - Kajal S. Patel
, Jagdish S. Shah:
Analysis of Existing Trust Based Routing Schemes Used in Wireless Network. 26-40 - Shaikha Alduaij, Zhiyuan Chen
, Aryya Gangopadhyay:
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level. 41-63
Volume 10, Number 3, 2016
- P. Mohamed Fathimal
, P. Arockia Jansi Rani
:
Threshold Secret Sharing Scheme for Compartmented Access Structures. 1-9 - Nilay R. Mistry
, Binoj Koshy, Mohindersinh Dahiya, Chirag Chaudhary, Harshal Patel, Dhaval Parekh, Jaidip Kotak, Komal Nayi, Priyanka Badva:
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method. 10-24 - Amardeep Singh, Divya Bansal, Sanjeev Sofat:
Preventing Identity Disclosure in Social Networks Using Intersected Node. 25-41 - Erukala Suresh Babu
, C. Nagaraju
, Munaga H. M. Krishna Prasad:
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks. 42-66 - Mahmood Fazlali
, Peyman Khodamoradi, Farhad Mardukhi, Masoud Nosrati
, Mohammad Mahdi Dehshibi
:
Metamorphic malware detection using opcode frequency rate and decision tree. 67-86
Volume 10, Number 4, 2016
- Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi:
Hybrid Intrusion Detection Framework for Ad hoc networks. 1-32 - Adesina S. Sodiya, Adegbuyi B.:
A Framework for Protecting Users' Privacy in Cloud. 33-43 - Azin Moradbeikie, Saeid Abrishami
, Hasan Abbasi:
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing. 44-57 - Sumana M.
, K. S. Hareesha
:
Accurate Classification Models for Distributed Mining of Privately Preserved Data. 58-73

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.