


default search action
International Journal of Information Security and Privacy, Volume 5
Volume 5, Number 1, 2011
- Devon Bennett, Hamid Jahankhani, Mohammad Dastbaz, Hossein Jahankhani:

A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment. 1-13 - Archana Bhattarai, Dipankar Dasgupta:

A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis. 14-32 - Ioana Lasc, Reiner Dojen, Tom Coffey:

A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications. 33-49 - Garry L. White, Francis A. Méndez Mediavilla, Jaymeen R. Shah:

Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers. 50-66
Volume 5, Number 2, 2011
- Douglas M. Kline, Ling He, Ulku Yaylacicegi:

User Perceptions of Security Technologies. 1-12 - Md. Golam Kaosar, Xun Yi

:
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree. 13-32 - Anirban Sengupta

, Chandan Mazumdar:
A Mark-Up Language for the Specification of Information Security Governance Requirements. 33-53 - Cheng-Chi Lee

, Min-Shiang Hwang, I-En Liao:
On the Security of Self-Certified Public Keys. 54-60
Volume 5, Number 3, 2011
- Ahmed Patel, Kenan Kalajdzic, Laleh Golafshan:

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card. 1-18 - John Harold Pardue, Jeffrey P. Landry, Alec Yasinsac:

E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems. 19-35 - S. Srinivasan, Sathish Kumar Alampalayam:

Intrusion Detection Algorithm for MANET. 36-49 - Mathew Nicho

, Hussein Fakhry, Charles Haiber:
An Integrated Security Governance Framework for Effective PCI DSS Implementation. 50-67
Volume 5, Number 4, 2011
- Murthy V. Rallapalli:

A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions. 1-7 - Oluwasefunmi 'Tale Arogundade

, A. T. Akinwale, Zhi Jin, Xiaoguang Yang:
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements. 8-30 - Benjamin Ngugi, Jafar Mana, Lydia Segal:

Evaluating the Quality and Usefulness of Data Breach Information Systems. 31-46 - Hassen Sallay

, Mohsen Rouached, Adel Ammar
, Ouissem Ben Fredj, Khalid Al-Shalfan, Majdi Ben Saad:
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework. 47-58

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














