default search action
Journal of Information Security and Applications, Volume 42
Volume 42, October 2018
- Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks. 1-17 - Ameer Pichan, Mihai M. Lazarescu, Sieteng Soh:
Towards a practical cloud forensics logging framework. 18-28 - Adele Khalunezhad, Neda Moghim, Behrouz Shahgholi Ghahfarokhi:
Trust-based multi-hop cooperative spectrum sensing in cognitive radio networks. 29-35 - Ashley A. Cain, Morgan E. Edwards, Jeremiah D. Still:
An exploratory study of cyber hygiene behaviors and knowledge. 36-45 - Shweta Bhandari, Rekha Panihar, Smita Naval, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur:
SWORD: Semantic aWare andrOid malwaRe Detector. 46-56 - Ali Shakir Mahmood, Mohd Shafry Mohd Rahim:
Novel method for image security system based on improved SCAN method and pixel rotation technique. 57-70 - Manjukeshwar Reddy Mandadi, Varuneshwar Reddy Mandadi, Kazuhiro Ogata:
Formal analysis of a security protocol for e-passports based on rewrite theory specifications. 71-86 - Azadeh Imani Rad, Mahdi R. Alagheband, Saeed Banaeian Far:
Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols. 87-94 - Geeta Sharma, Sheetal Kalra:
A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications. 95-106 - Graeme Horsman:
A forensic examination of the technical and legal challenges surrounding the investigation of child abuse on live streaming platforms: A case study on Periscope. 107-117 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Signcryption. 118-134
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.