


default search action
Information Security Journal: A Global Perspective, Volume 29
Volume 29, Number 1, 2020
- Vankamamidi Srinivasa Naresh

, Reddi Sivaranjani, Nistala V. E. S. Murthy:
Provable secure lightweight multiple shared key agreement based on hyper elliptic curve Diffie-Hellman for wireless sensor networks. 1-13 - Junaid Latief Shah

, Heena Farooq Bhat:
Towards a Secure IPv6 Autoconfiguration. 14-29 - Farah Deeba

, Kun She, Fayaz Ali Dharejo
, Hira Memon:
Digital image watermarking based on ANN and least significant bit. 30-39
- Mukesh Dalal

, Mamta Juneja
:
Evaluation of orthogonal and biorthogonal wavelets for video steganography. 40-50
Volume 29, Number 2, 2020
- Alka Gupta

, Lalit Sen Sharma
:
Detecting attacks in high-speed networks: Issues and solutions. 51-61 - Shravani Mahesh Patil, B. R. Purushothama

:
DR-PRE: dual receiver proxy re-encryption scheme. 62-72
- Debojit Boro

, Mrinmoy Haloi, Dhruba K. Bhattacharyya:
A fast self-similarity matrix-based method for shrew DDoS attack detection. 73-90 - Prema T. Akkasaligar, Sumangala Biradar

:
Selective medical image encryption using DNA cryptography. 91-101
Volume 29, Number 3, 2020
- Tazmina Sharmin, Fabio Di Troia, Katerina Potika

, Mark Stamp
:
Convolutional neural networks for image spam detection. 103-117
- Mahsa Nooribakhsh, Mahdi MollaMotalebi:

A review on statistical approaches for anomaly detection in DDoS attacks. 118-133 - Priyansh Singh

, Shashikala Tapaswi, Sanchit Gupta
:
Malware Detection in PDF and Office Documents: A survey. 134-153
Volume 29, Number 4, 2020
- Sanaj Ms, Joe Prathap P. M

, Valanto Alappatt
:
Profit maximization based task scheduling in hybrid clouds using whale optimization technique. 155-168 - Nanta Janpitak

, Woraphon Lilakiatsakun, Chanboon Sathitwiriyawong:
The novel secure testament methodology for cryptocurrency wallet using mnemonic seed. 169-182 - Charu Gupta, Rakesh Kumar Singh, Amar Kumar Mohapatra:

A survey and classification of XML based attacks on web applications. 183-198 - Akshay Gajanan Bhosale

, Vikram Shripati Patil
:
A (2, 2) Visual Cryptography Technique with Improved Contrast. 199-208
Volume 29, Number 5, 2020
- Ogechukwu N. Iloanusi

, Ugochi C. Ejiogu:
Gender classification from fused multi-fingerprint types. 209-219 - Francesco Bergadano

, Milena Boetti, Fabio Cogno, Valerio Costamagna, Mario Leone, Marco Evangelisti:
A modular framework for mobile security analysis. 220-243 - Samaneh Mashhadi

:
Toward a formal proof for multi-secret sharing in the random oracle model. 244-249 - Ashutosh Bahuguna, Raj Kishor Bisht, Jeetendra Pande

:
Country-level cybersecurity posture assessment: Study and analysis of practices. 250-266
Volume 29, Number 6, 2020
- Femi Emmanuel Ayo

, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi-Alli
, Adebola Olayinka Adekunle, Joseph Bamidele Awotunde
:
Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection. 267-283 - Yuancheng Li

, Haiyan Hou, Wenping Chen:
A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing. 284-296 - Ali Cherif Khalfallah

, Naima Hadj-Said, Ali Pacha Adda:
A new chaotic encrypted image based on the trigonometric circle. 297-309 - Abdalla Alameen

, Ashu Gupta:
Fitness rate-based rider optimization enabled for optimal task scheduling in cloud. 310-326 - Samir Chabbi, Rachid Boudour, Fouzi Semchedine

, Djalel Chefrour
:
Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone. 327-340 - Zakaria Hassan Abdelwahab

, Talaat A. Elgarf, Abdelhalim Zekry:
Approved algorithmic security enhancement of stream cipher for advanced mobile communications. 341-365 - Thakkalapally Preethi

, B. B. Amberker:
Lattice-based group signature scheme without random oracle. 366-381

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














