![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 19
Volume 19, Number 1, February 2014
- Adrian Waller, Gregorio Martínez Pérez, Félix Gómez Mármol:
Editorial: Special issue on Identity Protection and Management. 1 - Georgios Kambourakis
:
Anonymity and closely related terms in the cyberspace: An analysis by example. 2-17 - Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng:
An efficient and secure anonymous mobility network authentication scheme. 18-24 - Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss:
Concepts and languages for privacy-preserving attribute-based authentication. 25-44 - Younis A. Younis
, Kashif Kifayat
, Madjid Merabti:
An access control model for cloud computing. 45-60 - Sanna Suoranta, Kamran Manzoor, Asko Tontti, Joonas Ruuskanen, Tuomas Aura:
Logout in single sign-on systems: Problems and solutions. 61-77
- Xiaole Fang
, Qianxue Wang
, Christophe Guyeux
, Jacques M. Bahi:
FPGA acceleration of a pseudorandom number generator based on chaotic iterations. 78-87 - Kiavash Satvat, Matthew Forshaw
, Feng Hao
, Ehsan Toreini:
On the privacy of private browsing - A forensic approach. 88-100
Volume 19, Number 2, April 2014
- Steve A. Schneider
, Vanessa Teague, Chris Culnane
, James Heather:
Special Section on Vote-ID 2013. 103-104 - Jurlind Budurushi
, Roman Jöris, Melanie Volkamer:
Implementing and evaluating a software-independent voting system for polling station elections. 105-114 - Bernhard Beckert
, Rajeev Goré, Carsten Schürmann, Thorsten Bormer, Jian Wang:
Verifying voting schemes. 115-129 - Rui Joaquim:
How to prove the validity of a complex ballot encryption to the voter and the public. 130-142
- Mohamed S. Kheir, Heinz Kreft, Reinhard H. Knöchel:
A novel RF fingerprinting approach for hardware integrated security. 143-148 - Seyed Morteza Hosseini, Hossein Karimi, Majid Vafaei Jahan
:
Generating pseudo-random numbers by combining two systems with complex behaviors. 149-162
Volume 19, Number 3, July 2014
- Shujun Li
, Konrad Rieck, Alan Woodward:
Special issue on threat detection, analysis and defense. 163-164 - Stéphane Paul
, Raphaël Vignon-Davillier
:
Unifying traditional risk assessment approaches with attack trees. 165-181 - Fabrizio Baiardi
, Fabio Corò, Federico Tonelli
, Daniele Sgandurra:
Automating the assessment of ICT risk. 182-193 - Babak Rahbarinia, Roberto Perdisci
, Andrea Lanzi, Kang Li:
PeerRush: Mining for unwanted P2P traffic. 194-208 - Martin Johns
:
Script-templates for the Content Security Policy. 209-223 - Jason C. Cohen, Subrata Acharya:
Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection. 224-244
- Saman Salehi, M. A. Balafar
:
Visual multi secret sharing by cylindrical random grid. 245-255
Volume 19, Numbers 4-5, November 2014
- Sotirios Pirounias, Dimitrios Mermigas, Constantinos Patsakis
:
The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study. 257-271 - Sudipta Kumar Ghosal, Jyotsna Kumar Mandal
:
Binomial transform based fragile watermarking for image authentication. 272-281 - Marimuthu Karuppiah
, R. Saravanan
:
A secure remote user mutual authentication scheme using smart cards. 282-294 - Partha Sarathi Roy
, Avishek Adhikari:
One-sided leakage-resilient privacy only two-message oblivious transfer. 295-300 - Mohamed S. Kheir, Heinz Kreft, Iris Hölken, Reinhard H. Knöchel:
On the physical robustness of RF on-chip nanostructured security. 301-307 - Chen Sun, Yang Wang, Jun Zheng
:
Dissecting pattern unlock: The effect of pattern strength meter on pattern selection. 308-320
Volume 19, Number 6, December 2014
- Robert Layton, Paul A. Watters
:
A methodology for estimating the tangible cost of data breaches. 321-330 - Kamel Mohamed Faraoun:
A novel fast and provably secure (t, n)-threshold secret sharing construction for digital images. 331-340
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.