default search action
International Journal of Information Security and Privacy, Volume 6
Volume 6, Number 1, 2012
- S. Srinivasan, Robert Barker:
Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce. 1-13 - Thijs Baars, Marco R. Spruit:
Designing a Secure Cloud Architecture: The SeCA Model. 14-32 - Pei Yuan Shen, Maolin Tang, Vicky Liu, William J. Caelli:
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs. 33-56 - Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne:
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM. 57-76
Volume 6, Number 2, 2012
- Ahmed Patel, Mona Taghavi, Joaquim Celestino Júnior, Rodziah Latih, Abdullah Mohd Zin:
Safety Measures for Social Computing in Wiki Learning Environment. 1-15 - Dongjin Kim, Zhiyuan Chen, Aryya Gangopadhyay:
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification. 16-33 - Roli Bansal, Priti Sehgal, Punam Bedi:
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking. 34-52 - Umashankar Rawat, Shishir Kumar:
ECFS: An Enterprise-Class Cryptographic File System for Linux. 53-63 - Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption. 64-94
Volume 6, Number 3, 2012
- Allan Rwabutaza, Ming Yang, Nikolaos G. Bourbakis:
A Comparative Survey on Cryptology-Based Methodologies. 1-37 - Zakarya A. Alzamil:
Information Security Awareness at Saudi Arabians' Organizations: An Information Technology Employee's Perspective. 38-55 - Azam Zavvari, Ahmed Patel:
Critical Evaluation of RFID Security Protocols. 56-74 - Amanda Eisenga, Travis L. Jones, Walter Rodriguez:
Investing in IT Security: How to Determine the Maximum Threshold. 75-87 - Debajyoti Konar, Chandan Mazumdar:
A Practical Approach of Fairness in E-Procurement. 88-110
Volume 6, Number 4, 2012
- Pejman Niksaz, Mohammad Javad Kargar:
A Full Review of Attacks and Countermeasures in Wireless Sensor Networks. 1-39 - Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang:
A Survey of U.S. Laws for Health Information Security & Privacy. 40-54 - Sunil Kumar Muttoo, Vinay Kumar, Abhishek Bansal:
Secure Data Hiding Using Eight Queens Solutions. 55-70 - Ming Yang, Chih-Cheng Hung, Edward Jung:
Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization. 71-93 - Marco R. Spruit, Wouter de Bruijn:
CITS: The Cost of IT Security Framework. 94-116
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.