default search action
Journal of Information Security and Applications, Volume 18
Volume 18, Number 1, July 2013
- Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani, Radu State, Joaquín García-Alfaro, Nadia Tawbi:
Editorial. 1 - Nizar Kheir:
Behavioral classification and detection of malware through HTTP user agent anomalies. 2-13 - William M. Fitzgerald, Ultan Neville, Simon N. Foley:
MASON: Mobile autonomic security for network access controls. 14-29 - Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben-Ghorbel-Talbi, Stephane Morucci, Nada Essaouini:
Smatch: Formal dynamic session management model for RBAC. 30-44 - Palaniappan Shamala, Rabiah Ahmad, Mariana Yusoff:
A conceptual framework of info structure for information security risk assessment (ISRA). 45-52 - Sherif Saad, Issa Traoré:
Semantic aware attack scenarios reconstruction. 53-67 - Tahsin Arafat Reza, Michel Barbeau:
QaASs: QoS aware adaptive security scheme for video streaming in MANETs. 68-82 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Message transmission and key establishment: General equality for weak and strong capacities. 83-95
Volume 18, Numbers 2-3, September 2013
- Lee-Ming Cheng, K. W. Wong:
Editorial: Smart Card and RFID Security. 97 - Sheetal Kalra, Sandeep K. Sood:
Advanced remote user authentication protocol for multi-server architecture based on ECC. 98-107 - Olga Gadyatskaya, Fabio Massacci, Quang Huy Nguyen, Boutheina Chetali:
Load time code validation for mobile phone Java Cards. 108-129 - Samiya Hamadouche, Jean-Louis Lanet:
Virus in a smart card: Myth or reality? 130-137 - Armin Krieg, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Andreas Genser, Josef Haid:
Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors. 138-147 - Nassima Kamel, Jean-Louis Lanet:
Risks induced by Web applications on smart cards. 148-156
Volume 18, Number 4, December 2013
- Sagar Gujjunoori, B. B. Amberker:
DCT based reversible data embedding for MPEG-4 video using HVS characteristics. 157-166 - V. Santhi, Pachiyappan Arulmozhivarman:
Hadamard transform based adaptive visible/invisible watermarking scheme for digital images. 167-179 - Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar:
Secret image sharing using grayscale payload decomposition and irreversible image steganography. 180-192 - Muhamed Turkanovic, Gregor Polancic:
On the security of certain e-communication types: Risks, user awareness and recommendations. 193-205 - Thi Hanh Nguyen, Yi Wang, Renfa Li:
An improved ridge features extraction algorithm for distorted fingerprints matching. 206-214 - Cheng-Chi Lee, Yan-Ming Lai, Chin-Sung Hsiao:
Cryptanalysis of a simple key assignment for access control based on polynomial. 215-218
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.