default search action
International Journal of Information Security and Privacy, Volume 5
Volume 5, Number 1, 2011
- Devon Bennett, Hamid Jahankhani, Mohammad Dastbaz, Hossein Jahankhani:
A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment. 1-13 - Archana Bhattarai, Dipankar Dasgupta:
A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis. 14-32 - Ioana Lasc, Reiner Dojen, Tom Coffey:
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications. 33-49 - Garry L. White, Francis A. Méndez Mediavilla, Jaymeen R. Shah:
Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers. 50-66
Volume 5, Number 2, 2011
- Douglas M. Kline, Ling He, Ulku Yaylacicegi:
User Perceptions of Security Technologies. 1-12 - Md. Golam Kaosar, Xun Yi:
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree. 13-32 - Anirban Sengupta, Chandan Mazumdar:
A Mark-Up Language for the Specification of Information Security Governance Requirements. 33-53 - Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao:
On the Security of Self-Certified Public Keys. 54-60
Volume 5, Number 3, 2011
- Ahmed Patel, Kenan Kalajdzic, Laleh Golafshan:
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card. 1-18 - John Harold Pardue, Jeffrey P. Landry, Alec Yasinsac:
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems. 19-35 - S. Srinivasan, Sathish Kumar Alampalayam:
Intrusion Detection Algorithm for MANET. 36-49 - Mathew Nicho, Hussein Fakhry, Charles Haiber:
An Integrated Security Governance Framework for Effective PCI DSS Implementation. 50-67
Volume 5, Number 4, 2011
- Murthy V. Rallapalli:
A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions. 1-7 - Oluwasefunmi 'Tale Arogundade, A. T. Akinwale, Zhi Jin, Xiaoguang Yang:
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements. 8-30 - Benjamin Ngugi, Jafar Mana, Lydia Segal:
Evaluating the Quality and Usefulness of Data Breach Information Systems. 31-46 - Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, Majdi Ben Saad:
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework. 47-58
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.