


default search action
Journal of Information Security and Applications, Volume 42
Volume 42, October 2018
- Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks. 1-17 - Ameer Pichan
, Mihai M. Lazarescu
, Sieteng Soh
:
Towards a practical cloud forensics logging framework. 18-28 - Adele Khalunezhad
, Neda Moghim
, Behrouz Shahgholi Ghahfarokhi
:
Trust-based multi-hop cooperative spectrum sensing in cognitive radio networks. 29-35 - Ashley A. Cain, Morgan E. Edwards, Jeremiah D. Still
:
An exploratory study of cyber hygiene behaviors and knowledge. 36-45 - Shweta Bhandari
, Rekha Panihar, Smita Naval
, Vijay Laxmi
, Akka Zemmari
, Manoj Singh Gaur
:
SWORD: Semantic aWare andrOid malwaRe Detector. 46-56 - Ali Shakir Mahmood
, Mohd Shafry Mohd Rahim:
Novel method for image security system based on improved SCAN method and pixel rotation technique. 57-70 - Manjukeshwar Reddy Mandadi
, Varuneshwar Reddy Mandadi
, Kazuhiro Ogata:
Formal analysis of a security protocol for e-passports based on rewrite theory specifications. 71-86 - Azadeh Imani Rad, Mahdi R. Alagheband
, Saeed Banaeian Far
:
Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols. 87-94 - Geeta Sharma
, Sheetal Kalra
:
A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications. 95-106 - Graeme Horsman:
A forensic examination of the technical and legal challenges surrounding the investigation of child abuse on live streaming platforms: A case study on Periscope. 107-117 - Pratish Datta
, Ratna Dutta, Sourav Mukhopadhyay:
Functional Signcryption. 118-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.