Stop the war!
Остановите войну!
for scientists:
default search action
Information Security Journal: A Global Perspective, Volume 20
Volume 20, Number 1, 2011
- Md. Enamul Kabir, Hua Wang:
Microdata Protection Method Through Microaggregation: A Median-Based Approach. 1-8 - G. P. Biswas:
Establishment of Authenticated Secret Session Keys Using Digital Signature Standard. 9-16 - Panagiota Lagou, Gregory Chondrokoukis:
Choosing a Biometric for Nonrepudiation. 17-24 - Rashid Sheikh, Durgesh Kumar Mishra, Beerendra Kumar:
Secure Multiparty Computation: From Millionaires Problem to Anonymizer. 25-33 - Jonathan Matusitz:
Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo. 34-44 - Rajesh Kumar Tiwari, G. Sahoo Mesra:
A Novel Methodology for Data Hiding in PDF Files. 45-57 - Kevin L. McLaughlin:
Cyber Attack! Is a Counter Attack Warranted? 58-64
Volume 20, Number 2, 2011
- Nicolas Sklavos:
Editorial. 65-66
- Sandeep K. Sood:
Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards. 67-77 - S. Geetha, N. Kamaraj:
MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure. 78-90 - Jeff Stapleton, Ralph Spencer Poore:
Tokenization and Other Methods of Security for Cardholder Data. 91-99 - Sandeep K. Sood:
Cookie-Based Virtual Password Authentication Protocol. 100-111 - Uloli Thiruvaazhi, R. Divya:
Web Authentication Protocol Using Zero Knowledge Proof. 112-121
Volume 20, Number 3, 2011
- Derek Mohammed:
Security in Cloud Computing: An Analysis of Key Drivers and Constraints. 123-127 - Priti Sikdar:
Alternate Approaches to Business Impact Analysis. 128-134 - Osama S. Faragallah:
An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications. 135-147 - N. V. Rao, V. Meena Kumari:
Watermarking in Medical Imaging for Security and Authentication. 148-155 - Mohini Bhardwaj, Amar Jeet Singh:
Automated Integrated Examination System: A Security Concern. 156-162 - Sirisha Surisetty, Sanjeev Kumar:
Apple's Leopard Versus Microsoft's Windows XP: Experimental Evaluation of Apple's Leopard Operating System with Windows XP-SP2 under Distributed Denial of Service Security Attacks. 163-172
Volume 20, Numbers 4-5, 2011
- R. Saminathan, K. Selvakumar:
TRUCE - An Adaptive Trust Management Algorithm Over MANET for Service-Based Mobile Computing Environments. 173-184 - J. Arokia Renjit, K. L. Shunmuganathan:
Multi-Agent-Based Anomaly Intrusion Detection. 185-193 - Rachid Beghdad, Mohamed Touati, Mohamed Seghir Berboucha:
A Data Analysis-Based Approach for Detecting Intruders. 194-209 - Sourav Mukherjee, Bibhudatta Sahoo:
A Survey on Hardware Implementation of IDEA Cryptosystem. 210-218 - Karthikeyan Shanmugam, Roger S. Powell, Tom Owens:
An Approach for Validation of Digital Anti-Forensic Evidence. 219-230 - Azzam Mourad, Hadi Otrok, Lama Baajour:
New Approach Targeting Security Patterns Development and Deployment. 231-244 - E. S. Ismail, N. M. F. Tahat:
The Modified Signature Scheme Based on Factoring and Discrete Logarithms. 245-249 - Saju P. John, Philip Samuel:
A Predictive Clustering Technique for Effective Key Management in Mobile Ad Hoc Networks. 250-260
- Larry Marks:
Hardening Network Security, by Mallery, J., Zahn, J., Kelly, P., Noonan, W., Seagren, E., Love, P., Kraft, R., and O'Neill, M.(2005). CA: McGraw-Hill/Osborne. (608 pp., $ 39.99 USD, ISBN: 978-0072257038). 261
Volume 20, Number 6, 2011
- Edward A. Morse, Vasant Raval, John R. Wingender Jr.:
Market Price Effects of Data Security Breaches. 263-273 - Amit Phadikar, Santi P. Maity:
On Security of Compressed Gray Scale Image Using Joint Encryption and Data Hiding. 274-289 - Vandana Gandotra, Archana Singhal, Punam Bedi:
MASPTA-O: Multiagent System Planning to Avoid Threats Optimally. 290-310 - Eric H. Corwin:
Deep Packet Inspection: Shaping the Internet and the Implications on Privacy and Security. 311-316 - R. Mynuddin Sulthani, D. Sreenivasa Rao:
A QoS Estimation-Based Scheduler for Real-Time Traffic in IEEE 802.11e Mobile Ad hoc Networks. 317-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.