


default search action
International Journal of Information Security and Privacy, Volume 7
Volume 7, Number 1, 2013
- Nigel J. Martin, John L. Rice
:
Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users. 1-15 - Satya Prakash, Abhishek Vaish
, Natalie Coull, SaravanaKumar G, T. N. Srinidhi, Jayaprasad Botsa:
Child Security in Cyberspace Through Moral Cognition. 16-29 - Mathews Z. Nkhoma, Duy Pham Thien Dang
:
Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach. 30-44 - Ousmane Amadou Dia, Csilla Farkas:
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes. 45-62 - Walid Y. Zibideh, Mustafa M. Matalgah:
Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time. 63-75
Volume 7, Number 2, 2013
- Katharina Bräunlich, Rüdiger Grimm:
Development of A Formal Security Model for Electronic Voting Systems. 1-28 - Ammar Alazab
, Michael Hobbs
, Jemal H. Abawajy, Ansam Khraisat:
Malware Detection and Prevention System Based on Multi-Stage Rules. 29-43 - Siddharth Singh, Tanveer J. Siddiqui:
Robust Image Data Hiding Technique for Copyright Protection. 44-56 - Khaoula Marzouki, Amira Radhouani, Narjes Ben Rajeb:
Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol. 57-85
Volume 7, Number 3, 2013
- Omar Banimelhem
, Lo'ai Ali Tawalbeh
, Moad Mowafi
, Mohammed A. Al-Batati:
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm. 1-15 - Daniela Simic-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Roßnagel:
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA. 16-35 - Esraa Omran, Tyrone Grandison
, David Nelson, Albert Bokma:
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain. 36-52 - Michele Tomaiuolo
:
dDelega: Trust Management for Web Services. 53-67
Volume 7, Number 4, 2013
- Shadi Rasheed Masadeh, Shadi A. Aljawarneh
, Ashraf Odeh, Abdullah A. Alhaj:
Secure Communication: A Proposed Public Key Watermark System. 1-10 - K. Saravanan
, A. Senthilkumar:
Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design. 11-21 - Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang:
A Survey of Security Standards Applicable to Health Information Systems. 22-36 - Srinivasa K. G.
:
An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines. 37-52 - Salima Hacini, Zahia Guessoum, Mohamed Cheikh:
False Alarm Reduction Using Adaptive Agent-Based Profiling. 53-74

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.