default search action
Journal of Information Security and Applications, Volume 37
Volume 37, December 2017
- Stavros D. Nikolopoulos, Iosif Polenakis:
Preventing malware pandemics in mobile devices by establishing response-time bounds. 1-14 - Apurva S. Kittur, Alwyn Roshan Pais:
Batch verification of Digital Signatures: Approaches and challenges. 15-27 - Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin:
A survey on behavioral biometric authentication on smartphones. 28-37 - Vidhi Khanduja:
Database watermarking, a technological protective measure: Perspective, security analysis and future directions. 38-49 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
Attribute based access control scheme with controlled access delegation for collaborative E-health environments. 50-64 - Deep Chandra Mishra, R. K. Sharma, Saurav Suman, Akhilesh Prasad:
Multi-layer security of color image based on chaotic system combined with RP2DFRFT and Arnold Transform. 65-90 - Abdurrahman Pektas, Tankut Acarman:
Classification of malware families based on runtime behaviors. 91-100 - Abdulhadi Shoufan, Ernesto Damiani:
On inter-Rater reliability of information security experts. 101-111 - Libing Wu, Jing Wang, Kim-Kwang Raymond Choo, Yuangang Li, Debiao He:
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network. 112-121
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.