default search action
ISC International Journal of Information Security, Volume 1
Volume 1, Number 1, January 2009
- Mohammad Reza Aref, Rasool Jalili:
Editorial. 1-2
- Ali Fanian, Mehdi Berenjkoub, T. Aaron Gulliver:
A TESLA-based mutual authentication protocol for GSM networks. 3-15 - Vajiheh Sabeti, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani:
Steganalysis of embedding in difference of image pixel pairs by neural network. 17-26 - Hoi Ting Poon, Ali Miri:
A collusion attack on the fuzzy vault scheme. 27-34 - Jafar Haadi Jafarian, Morteza Amini:
CAMAC: a context-aware mandatory access control model. 35-54 - Rasoul Ramezanian:
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions. 55-67
Volume 1, Number 2, July 2009
- Rasool Jalili:
Editorial. 69-70
- Jovan Dj. Golic:
Moving dispersion method for statistical anomaly detection in intrusion detection systems. 71-90
- Ian G. Harris, Thoulfekar Alrahem, Alex Chen, Nicholas DiGiuseppe, Jefferey Gee, Shang-Pin Hsiao, Sean Mattox, Taejoon Park, Saravanan Selvaraj, Albert Tam, Marcel Carlsson:
Security testing of session initiation protocol implementations. 91-103 - M. Tariq Banday, Nisar Ahmed Shah:
Image flip CAPTCHA. 105-123 - Morteza Nikooghadam, Ali Zakerolhosseini:
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. 125-131
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.