default search action
International Journal of Information Security and Privacy, Volume 13
Volume 13, Number 1, 2019
- Oshin Sharma, Hemraj Saini:
Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm. 1-16 - Yerra Shankar Rao, Prasant Kumar Nayak, Hemraj Saini, Tarini Charana Panda:
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence. 17-29 - Pratiksha Gautam, Hemraj Saini:
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques. 30-45 - Mamata Rath, Binod Kumar Pattanayak:
Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET. 46-58 - Pratiksha Gautam, Mohd. Dilshad Ansari, Surender Kumar Sharma:
Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing. 59-69 - Rajwinder Kaur, Karan Verma, Shelendra Kumar Jain, Nishtha Kesswani:
Efficient Routing Protocol for Location Privacy Preserving in Internet of Things. 70-85 - Sarika Choudhary, Nishtha Kesswani:
A Survey: Intrusion Detection Techniques for Internet of Things. 86-105
Volume 13, Number 2, 2019
- T. Bhaskar, Madhu Oruganti:
Reversible Data Hiding Scheme for Video. 1-13 - Mamdouh Alenezi, Muhammad Usama, Khaled Mohamad Almustafa, Waheed Iqbal, Muhammad Ali Raza, Tanveer Khan:
An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments. 14-31 - Ali Amur Al Shidhani:
Cyber Defense Maturity Levels and Threat Models for Smart Cities. 32-46 - Martin Boldt, Kaavya Rekanar:
Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies. 47-66 - Marwan Majeed Nayyef, Ali Makki Sagheer:
Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions. 67-85 - Satheesh Abimannan, Kumaravelu R.:
A Mathematical Model of HMST Model on Malware Static Analysis. 86-103 - Feng Xu, Mingming Su, Yating Hou:
Privacy Preservation Based on Separation Sensitive Attributes for Cloud Computing. 104-119
Volume 13, Number 3, 2019
- Tarun Kumar, Dharmender Singh Kushwaha:
An Intelligent Surveillance System Based on IoT for Internal Security of a Nation. 1-30 - Alok Kumar Shukla:
Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection. 31-47 - Abhishek K. Singh, Naresh Kumar Nagwani, Sudhakar Pandey:
Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site. 48-59 - Vinay Pathak:
A Priority Based Efficient Secure Framework for WBANs. 60-73 - Deepika Agrawal, Sudhakar Pandey, Veena Anand:
A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks. 74-90 - Anurag Shukla, Sarsij Tripathi:
A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT. 91-105 - Ashish K. Tripathi, Kapil Sharma, Manju Bala:
Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce. 106-122
Volume 13, Number 4, 2019
- Surjit Paul, Sanjay Kumar, Rajiv Ranjan Suman:
A Quantum Secure Entity Authentication Protocol Design for Network Security. 1-11 - G. Sravan Kumar, A. Sri Krishna:
Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption. 12-27 - N. Syed Siraj Ahmed, Debi Prasanna Acharjya:
A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set. 28-52 - Ranu Gupta, Rahul Pachauri, Ashutosh Singh:
Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions. 53-67 - Asha Jyothi Ch, G. Narsimha:
Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks. 68-88 - Pankaj Kumar Sa, Vishnu Sharma, Gaurav Sharma, Tarunpreet Bhatia:
An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps. 89-108 - Ismaila Adeniyi Kamil, Sunday Oyinlola Ogundoyin:
A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks. 109-138
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.