


default search action
Journal of Internet Services and Information Security, Volume 4
Volume 4, Number 1, February 2014
- Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Universal Re-encryption for Mixnet. 1-11 - Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Performance of Distributed Text Processing System Using Hadoop. 12-24 - Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks. 25-36 - Nan Guo, Jia Wang, Tianhan Gao, Kangbin Yim:
Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential. 37-46 - Kun-Lin Tsai, Fang-Yie Leu, Tien-Han Wu, Shin-shiuan Chiou, Yu-Wei Liu, Han-Yun Liu:
A Secure ECC-based Electronic Medical Record System. 47-57 - Lidia Ogiela, Marek R. Ogiela:
Towards Cognitive Cryptography. 58-63 - ChanChamnab Than, SangYong Han:
Improving Recommender Systems by Incorporating Similarity, Trust and Reputation. 64-76
Volume 4, Number 2, May 2014
- Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Guest Editorial: Special Issue on Cyber Security Protections and Applications. 1-3 - Wolter Pieters, Zofia Lukszo, Dina Hadziosmanovic, Jan van den Berg:
Reconciling Malicious and Accidental Risk in Cyber Security. 4-26 - Jun Ye, Yong Ding, Xing-zhong Xiong, Shu-Lin Wu:
Dynamic Model for Anonymity Measurement Based on Information Entropy. 27-37 - Hiroshi Fujinoki, Christopher A. Chelmecki, David M. Henry:
Fail-Safe Security Architecture to Prevent Privacy Leaks from E-commerce Servers. 38-54 - Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi:
DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android. 55-69 - Keying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma:
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme. 70-82
Volume 4, Number 3, August 2014
- Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:
Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units. 1-20 - Ram B. Basnet, Andrew H. Sung:
Learning to Detect Phishing Webpages. 21-39 - Tomoyuki Ishida, Kazuhiro Takahagi, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata:
The Real-time Disaster Damage Information Sharing System for Information Acquiring in Large-scale Natural Disaster. 40-58 - Zhifeng Xiao, Yun Wang:
Leveraging Mobile Agents for Log Analysis in Data Center Networks. 59-71 - Jakub Breier:
Asset Valuation Method for Dependent Entities. 72-81 - Revisiting the BAN-Modified Andrew Secure RPC Protocol. 82-96
Volume 4, Number 4, November 2014
- Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. 1-13 - Fang-Yie Leu, Yi-Ting Hsiao:
A Grid System Detecting Internal Malicious Behaviors at System Call Level. 14-24 - Dongjin Kim, Seong-je Cho, Sangchul Han, Minkyu Park, Ilsun You:
Open Source Software Detection using Function-level Static Software Birthmark. 25-37 - JaeCheol Ha, YongJe Choi, Dooho Choi, Hoonjae Lee:
Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm. 38-51 - Hsing-Chung Chen, Hui-Kai Su:
A Cooperative Trust Bit-Map Routing Protocol Using the GA Algorithm for Reducing the Damages from the InTs in WANETs. 52-70 - Sangho Park, Jihyun Bang, Mirim Ahn, Woomin Lee, Taekyoung Kwon:
A Method for Hiding Link Layer Addresses Using Bloom Filter in Wireless Sensor Networks. 71-81 - Mi-Young Cho, Young-Sook Jeong:
Face Recognition Performance Comparison of Fake Faces with Real Faces in Relation to Lighting. 82-90 - Mye M. Sohn, Saerom Kang, Hyun Jung Lee:
Integrated Data Model Development Framework for the Architecture Descriptions. 91-102 - In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, Eul Gyu Im:
Malware Similarity Analysis using API Sequence Alignments. 103-114 - Su-Wan Park, Jeong Hyun Yi:
Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android. 115-126 - Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. 127-137

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.