


default search action
Journal of Information Security and Applications, Volume 20
Volume 20, February 2015
- Zhili Sun
, Haitham S. Cruickshank:
Guest Editorial: Security, privacy and trust in future networks and mobile computing. 1-2 - M. Thangavel
, P. Varalakshmi, Mukund Murrali, K. Nithya:
An Enhanced and Secured RSA Key Generation Scheme (ESRKGS). 3-10 - Haleh Amintoosi
, Salil S. Kanhere
, Mohammad Allahbakhsh
:
Trust-based privacy-aware participant selection in social participatory sensing. 11-25 - Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou:
Efficient suspicious URL filtering based on reputation. 26-36 - Sheetal Kalra
, Sandeep K. Sood
:
Advanced password based authentication scheme for wireless sensor networks. 37-46 - Pallipamu Venkateswara Rao, K. Thammi Reddy, P. Suresh Varma:
ASH-512: Design and implementation of cryptographic hash algorithm using co-ordinate geometry concepts. 47-60 - Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens:
Mining a high level access control policy in a network with multiple firewalls. 61-73 - Pranab Kumar Dhar, Tetsuya Shimamura:
Blind SVD-based audio watermarking using entropy and log-polar transformation. 74-83 - Blaz Markelj, Igor Bernik
:
Safe use of mobile devices arises from knowing the threats. 84-89 - Marwan Darwish
, Abdelkader Ouda
, Luiz Fernando Capretz:
A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks. 90-98

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.