![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Information Security Journal: A Global Perspective, Volume 27
Volume 27, Number 1, 2018
- Laima Kauspadiene, Simona Ramanauskaite
, Antanas Cenys
, Justinas Janulevicius, Justinas Rastenis
:
Modeling of enterprise management structure for data leakage evaluation. 1-13 - Nour El Houda Asma Merabet, Redha Benzid:
Progressive image secret sharing scheme based on Boolean operations with perfect reconstruction capability. 14-28 - Longbin Chen
, Li-Chiou Chen, Nader Nassar:
Seed-based authentication for mobile clients across multiple devices. 29-41 - Samta Gajbhiye
, Sanjeev Karmakar, Monisha Sharma, Sanjay Sharma:
Two-party secure connection in Bluetooth-enabled devices. 42-56 - Noor R. Al-Kazaz
, Sean A. Irvine, William John Teahan:
An automatic cryptanalysis of simple substitution ciphers using compression. 57-75
Volume 27, Number 2, 2018
- K. Pradeep, T. Prem Jacob
:
CGSA scheduler: A multi-objective-based hybrid approach for task scheduling in cloud environment. 77-91 - Mehmet Ulvi Simsek, Feyza Yildirim Okay
, Dilan Mert, Suat Özdemir
:
TPS3: A privacy preserving data collection protocol for smart grids. 102-118
- Ammar Amran, Zarul Fitri Zaaba, Manmeet Kaur Mahinderjit Singh
:
Habituation effects in computer security warning. 119-131
Volume 27, Number 3, 2018
- Sabah Delenda, Lemnouar Noui
:
A new steganography algorithm using polar decomposition. 133-144 - Shymalagowri Selvaganapathy
, Mathappan Nivaashini
, Hemapriya Natarajan:
Deep belief network based detection and categorization of malicious URLs. 145-161
- Diego M. Mendez
, Ioannis Papapanagiotou
, Baijian Yang
:
Internet of things: Survey on security. 162-182
Volume 27, Number 4, 2018
- K. Shanthi, D. Murugan, T. Ganesh Kumar:
Trust-based intrusion detection with secure key management integrated into MANET. 183-191
- Ammar Amran, Zarul Fitri Zaaba, Manmeet Kaur Mahinderjit Singh
:
Habituation effects in computer security warning. 192-204
- Lanfranco Lopriore:
Key management in tree shaped hierarchies. 205-213 - Krishna Prakasha
, Balachandra Muniyal, Vasundhara Acharya
, Suyash Krishna, Smriti Prakash:
Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list. 214-229 - Kassim S. Mwitondi
, Shahrzad Zargari:
An iterative multiple sampling method for intrusion detection. 230-239
Volume 27, Numbers 5-6, 2018
- Ram Gopal Sharma, Priti Dimri, Hitendra Garg:
Visual cryptographic techniques for secret image sharing: a review. 241-259
- Jasmin Kaur, Rozita A. Dara, Charlie Obimbo, Fei Song, Karen Menard:
A comprehensive keyword analysis of online privacy policies. 260-275 - Oladayo Olufemi Olakanmi, Samuel Oluwaseye Oke:
MASHED: Security and privacy-aware mutual authentication scheme for heterogeneous and distributed mobile cloud computing services. 276-291 - Saud Alotaibi
, Steven Furnell
, Nathan L. Clarke
:
A novel transparent user authentication approach for mobile applications. 292-305
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.