![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
International Journal of Information Security and Privacy, Volume 9
Volume 9, Number 1, 2015
- Hossain Shahriar
, Hisham M. Haddad:
Client-Side Detection of Clickjacking Attacks. 1-25 - Teodor Sommestad, Henrik Karlzén, Jonas Hallberg:
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. 26-46 - Anser Ghazzaal Ali Alquraishee, Jayaprakash Kar
, Naomie Salim:
Short Online/Off-line Signature Scheme for Wireless Sensor Networks. 47-61 - Michael Lapke, Gurpreet Dhillon
:
Disassociations in Security Policy Lifecycles. 62-77
Volume 9, Number 2, 2015
- Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang:
Several Oblivious Transfer Variants in Cut-and-Choose Scenario. 1-12 - Aminu Bello
, William Liu
, Quan Bai
, Ajit Narayanan:
Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective. 13-30 - Weidong Yang, Limin Sun, Zhenqiang Xu:
Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks. 31-59 - Ali Farooq
, Johanna Isoaho, Seppo Virtanen
, Jouni Isoaho
:
Observations on Genderwise Differences among University Students in Information Security Awareness. 60-74
Volume 9, Number 3, 2015
- Milica Milutinovic, Andreas Put, Bart De Decker:
An Efficient, Anonymous and Unlinkable Incentives Scheme. 1-20 - Rui Wang
, Zhiyong Zhang, Lei Ju, Zhiping Jia:
A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking. 21-40 - Jing Long, Dafang Zhang, Wei Liang
, Xia-an Bi:
Signature Restoration for Enhancing Robustness of FPGA IP Designs. 41-56 - Abdullah Mohammed Almuhaideb
, Bala Srinivasan:
Authentication in Ubiquitous Networking. 57-83 - Ruiyang Xu, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu
, Zheng Yan
:
Software Defined Intelligent Building. 84-99
Volume 9, Number 4, 2015
- S. Selva Nidhyananthan
, Prasad M., R. Shantha Selva Kumari
:
Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group. 1-19 - Mohamed Amine Boudia
, Reda Mohamed Hamou
, Abdelmalek Amine
:
A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM. 26-58 - Mahinder Pal Singh Bhatia, Manjot Bhatia, Sunil Kumar Muttoo:
Secure Group Message Transfer Stegosystem. 59-76
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.