- Jyotsna Singh, Parul Garg, Alok Nath De:
Data Hiding in Audio Using Random Orthogonal Matrices. Inf. Secur. J. A Glob. Perspect. 19(5): 273-281 (2010) - Nicolas Sklavos:
On the Hardware Implementation Cost of Crypto-Processors Architectures. Inf. Secur. J. A Glob. Perspect. 19(2): 53-60 (2010) - Rama Lingeswara Tammineedi:
Business Continuity Management: A Standards-Based Approach. Inf. Secur. J. A Glob. Perspect. 19(1): 36-50 (2010) - Lo'ai Ali Tawalbeh, Saadeh Sweidan:
Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm. Inf. Secur. J. A Glob. Perspect. 19(5): 243-252 (2010) - Wendy W. Ting, David R. Comings:
Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework. Inf. Secur. J. A Glob. Perspect. 19(5): 253-262 (2010) - V. Vijayaraghavan, Sanjoy Kumar Paul, Rajarathnam Nallusamy:
iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts. Inf. Secur. J. A Glob. Perspect. 19(4): 213-225 (2010) - Ju An Wang, Michael M. Guo, Jairo Camargo:
An Ontological Approach to Computer System Security. Inf. Secur. J. A Glob. Perspect. 19(2): 61-73 (2010) - Seung S. Yang, Hongsik Choi, Hankyu Joo:
Vulnerability Analysis of the Grid Data Security Authentication System. Inf. Secur. J. A Glob. Perspect. 19(4): 182-190 (2010)