


default search action
International Journal of Information Security and Privacy, Volume 13
Volume 13, Number 1, 2019
- Oshin Sharma, Hemraj Saini

:
Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm. 1-16 - Yerra Shankar Rao

, Prasant Kumar Nayak, Hemraj Saini
, Tarini Charana Panda:
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence. 17-29 - Pratiksha Gautam, Hemraj Saini

:
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques. 30-45 - Mamata Rath

, Binod Kumar Pattanayak:
Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET. 46-58 - Pratiksha Gautam, Mohd. Dilshad Ansari

, Surender Kumar Sharma:
Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing. 59-69 - Rajwinder Kaur, Karan Verma

, Shelendra Kumar Jain
, Nishtha Kesswani:
Efficient Routing Protocol for Location Privacy Preserving in Internet of Things. 70-85 - Sarika Choudhary, Nishtha Kesswani:

A Survey: Intrusion Detection Techniques for Internet of Things. 86-105
Volume 13, Number 2, 2019
- T. Bhaskar

, Madhu Oruganti
:
Reversible Data Hiding Scheme for Video. 1-13 - Mamdouh Alenezi

, Muhammad Usama, Khaled Mohamad Almustafa
, Waheed Iqbal, Muhammad Ali Raza
, Tanveer Khan:
An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments. 14-31 - Ali Amur Al Shidhani:

Cyber Defense Maturity Levels and Threat Models for Smart Cities. 32-46 - Martin Boldt, Kaavya Rekanar:

Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies. 47-66 - Marwan Majeed Nayyef, Ali Makki Sagheer

:
Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions. 67-85 - Satheesh Abimannan, Kumaravelu R.

:
A Mathematical Model of HMST Model on Malware Static Analysis. 86-103 - Feng Xu, Mingming Su, Yating Hou:

Privacy Preservation Based on Separation Sensitive Attributes for Cloud Computing. 104-119
Volume 13, Number 3, 2019
- Tarun Kumar, Dharmender Singh Kushwaha:

An Intelligent Surveillance System Based on IoT for Internal Security of a Nation. 1-30 - Alok Kumar Shukla:

Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection. 31-47 - Abhishek K. Singh, Naresh Kumar Nagwani

, Sudhakar Pandey
:
Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site. 48-59 - Vinay Pathak:

A Priority Based Efficient Secure Framework for WBANs. 60-73 - Deepika Agrawal, Sudhakar Pandey

, Veena Anand
:
A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks. 74-90 - Anurag Shukla, Sarsij Tripathi

:
A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT. 91-105 - Ashish K. Tripathi

, Kapil Sharma
, Manju Bala
:
Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce. 106-122
Volume 13, Number 4, 2019
- Surjit Paul

, Sanjay Kumar, Rajiv Ranjan Suman
:
A Quantum Secure Entity Authentication Protocol Design for Network Security. 1-11 - G. Sravan Kumar

, A. Sri Krishna:
Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption. 12-27 - N. Syed Siraj Ahmed

, Debi Prasanna Acharjya
:
A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set. 28-52 - Ranu Gupta

, Rahul Pachauri
, Ashutosh Singh:
Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions. 53-67 - Asha Jyothi Ch, G. Narsimha:

Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks. 68-88 - Pankaj Kumar

, Vishnu Sharma, Gaurav Sharma, Tarunpreet Bhatia:
An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps. 89-108 - Ismaila Adeniyi Kamil

, Sunday Oyinlola Ogundoyin
:
A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks. 109-138

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














