


default search action
ISC International Journal of Information Security, Volume 3
Volume 3, Number 1, January 2011
- Rasool Jalili:
Editorial. 1-2
- Matt Bishop:
Computer security in the future. 3-27
- Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan:
QTRU: quaternionic version of the NTRU public-key cryptosystems. 29-42 - Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri:
Double voter perceptible blind signature based electronic voting protocol. 43-50 - Mehran Deljavan Amiri, Habibollah Danyali, Bahram Zahir Azami:
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms. 51-66
Volume 3, Number 2, July 2011
- Rasool Jalili:
Editorial. 67-68
- Phillip Rogaway:
Constructing cryptographic definitions. 69-76
- Hamid Farhadi, Maryam AmirHaeri, Mohammad Khansari:
Alert correlation and prediction using data mining and HMM. 77-101 - Zahra Derakhshandeh, Behrouz Tork Ladani:
A model for specification, composition and verification of access control policies and its application to web services. 103-120 - Somayeh Soltani, Mohammad Ali Hadavi, Rasool Jalili:
Separating indexes from data: a distributed scheme for secure database outsourcing. 121-133

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.