


default search action
International Journal of Information Security and Privacy, Volume 6
Volume 6, Number 1, 2012
- S. Srinivasan, Robert Barker:

Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce. 1-13 - Thijs Baars, Marco R. Spruit

:
Designing a Secure Cloud Architecture: The SeCA Model. 14-32 - Pei Yuan Shen, Maolin Tang

, Vicky Liu
, William J. Caelli:
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs. 33-56 - Z. Cliffe Schreuders, Tanya Jane McGill

, Christian Payne:
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM. 57-76
Volume 6, Number 2, 2012
- Ahmed Patel, Mona Taghavi, Joaquim Celestino Júnior, Rodziah Latih, Abdullah Mohd Zin

:
Safety Measures for Social Computing in Wiki Learning Environment. 1-15 - Dongjin Kim, Zhiyuan Chen, Aryya Gangopadhyay:

Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification. 16-33 - Roli Bansal

, Priti Sehgal, Punam Bedi
:
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking. 34-52 - Umashankar Rawat

, Shishir Kumar:
ECFS: An Enterprise-Class Cryptographic File System for Linux. 53-63 - Shaik Shakeel Ahamad

, V. N. Sastry, Siba K. Udgata
:
Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption. 64-94
Volume 6, Number 3, 2012
- Allan Rwabutaza, Ming Yang, Nikolaos G. Bourbakis:

A Comparative Survey on Cryptology-Based Methodologies. 1-37 - Zakarya A. Alzamil:

Information Security Awareness at Saudi Arabians' Organizations: An Information Technology Employee's Perspective. 38-55 - Azam Zavvari, Ahmed Patel:

Critical Evaluation of RFID Security Protocols. 56-74 - Amanda Eisenga, Travis L. Jones, Walter Rodriguez:

Investing in IT Security: How to Determine the Maximum Threshold. 75-87 - Debajyoti Konar, Chandan Mazumdar:

A Practical Approach of Fairness in E-Procurement. 88-110
Volume 6, Number 4, 2012
- Pejman Niksaz, Mohammad Javad Kargar

:
A Full Review of Attacks and Countermeasures in Wireless Sensor Networks. 1-39 - Francis Akowuah, Xiaohong Yuan, Jinsheng Xu

, Hong Wang:
A Survey of U.S. Laws for Health Information Security & Privacy. 40-54 - Sunil Kumar Muttoo, Vinay Kumar, Abhishek Bansal

:
Secure Data Hiding Using Eight Queens Solutions. 55-70 - Ming Yang, Chih-Cheng Hung, Edward Jung:

Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization. 71-93 - Marco R. Spruit

, Wouter de Bruijn:
CITS: The Cost of IT Security Framework. 94-116

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














