


default search action
Journal of Information Security and Applications, Volume 40
Volume 40, June 2018
- Jeremiah D. Still
, Jarad Bell:
Incognito: Shoulder-surfing resistant selection method. 1-8 - Dariush Abbasinezhad-Mood
, Morteza Nikooghadam
:
Design of an enhanced message authentication scheme for smart grid and its performance analysis on an ARM Cortex-M3 microcontroller. 9-19 - Mahmood Deypir, Abbas Horri:
Instance based security risk value estimation for Android applications. 20-30
- Panagiotis Andriotis
, Gianluca Stringhini, Martina Angela Sasse:
Studying users' adaptation to Android's run-time fine-grained access control system. 31-43 - Nikolai Hampton, Zubair A. Baig
, Sherali Zeadally:
Ransomware behavioural analysis on windows platforms. 44-51 - Simon Parkinson
, Saad Khan
:
Identifying irregularities in security event logs through an object-based Chi-squared test of independence. 52-62 - Soumik Mondal, Patrick Bours
:
A continuous combination of security & forensics for mobile devices. 63-77 - Benjamin Mood, Kevin R. B. Butler
:
PAL: A pseudo assembly language for optimizing secure function evaluation in mobile devices. 78-91 - Rohit M. Thanki
, Surekha Borra
:
A color image steganography in hybrid FRT-DWT domain. 92-102 - Aude Plateaux, Patrick Lacharme, Sylvain Vernois, Vincent Coquet, Christophe Rosenberger
:
A comparative study of card-not-present e-commerce architectures with card schemes: What about privacy? 103-110 - K. Abhimanyu Kumar Patro
, Bibhudendra Acharya
:
Secure multi-level permutation operation based multiple colour image encryption. 111-133 - Manish Kumar, Sunil Kumar
, Mrinal Kanti Das, Rajat Budhiraja, Sanjeev Singh:
Securing images with a diffusion mechanism based on Fractional Brownian Motion. 134-144 - Lixue Sun, Chunxiang Xu, Yuan Zhang
:
A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting. 145-155 - Bo Lang, Jinmiao Wang, Zhenhai Cao:
Multidimensional data tight aggregation and fine-grained access control in smart grid. 156-165 - Yi-Ning Liu
, Zhen Wu:
An improved threshold multi-level image recovery scheme. 166-172 - Dipak Kumar Jana
, Ramkrishna Ghosh:
Novel interval type-2 fuzzy logic controller for improving risk assessment model of cyber security. 173-182 - Fadi Almasalha, Farid Naït-Abdesselam, Goce Trajcevski, Ashfaq Khokhar:
Secure transmission of multimedia contents over low-power mobile devices. 183-192 - Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo
, Joseph Tonien
:
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves. 193-198 - Paul R. McWhirter
, Kashif Kifayat
, Qi Shi, Bob Askwith:
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel. 199-216 - Konstantinos Karampidis
, Ergina Kavallieratou
, Giorgos Papadourakis
:
A review of image steganalysis techniques for digital forensics. 217-235
- Yinyin Peng, Xuejing Niu, Lei Fu, Zhao-Xia Yin:
Image authentication scheme based on reversible fragile watermarking with two images. 236-246 - Nader Sohrabi Safa
, Carsten Maple, Tim Watson, Rossouw von Solms:
Motivation and opportunity based model to reduce information security insider threats in organisations. 247-257
- Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Managing distributed trust relationships for multi-modal authentication. 258-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.