default search action
International Journal of Information and Computer Security, Volume 14
Volume 14, Number 1, 2021
- A. Shailaja, Krishnamurthy Gorappa Ningappa:
A low area VLSI implementation of extended tiny encryption algorithm using Lorenz chaotic system. 3-19 - B. J. Ambika, M. K. Banga:
A novel energy efficient routing algorithm for MPLS-MANET using fuzzy logic controller. 20-39 - S. Bhargavi Latha, D. Venkata Reddy, A. Damodaram:
Video watermarking using neural networks. 40-59 - G. L. Anil, J. L. Mazher Iqbal:
Secure energy efficient network priority routing protocol for effective data collection and key management in dynamic WSNs. 60-78 - Yenumaladoddi Jayasimha, R. Venkata Siva Reddy:
A facial expression recognition model using hybrid feature selection and support vector machines. 79-97
Volume 14, Number 2, 2021
- Majid Mumtaz, Ping Luo:
An improved cryptanalysis of large RSA decryption exponent with constrained secret key. 102-117 - K. V. Raghavender, P. Premchand:
Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model. 118-135 - Sreenivasa Rao Annaluri, Venkata Ramana Attili, Kalli Srinivasa Nageswara Prasad:
Secure and unifold mining model for pattern discovery from streaming data. 136-145 - Kuppani Sathish, Kamakshaiah Kolli:
Sustainable wireless clouds with security assurance. 146-159 - V. Partha Saradi, P. Kailasapathi:
A novel binary encryption algorithm for navigation control of robotic vehicles through visible light communication. 160-170 - Vlera Alimehaj, Arbnor Halili, Ramadan Dervishi, Vehbi Neziri, Blerim Rexha:
Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology. 171-191 - Ayoub Amrani, Najat Rafalia, Jaafar Abouchabaka:
Mobile agent security using Amrani et al.'s protocol and binary serialisation. 192-209
Volume 14, Numbers 3/4, 2021
- Unnikrishnan K, Pramod K. V:
Prediction-based robust blind reversible watermarking for relational databases. 211-228 - Nanyuan Cao, Zhenfu Cao, Xiaolei Dong, Haijiang Wang:
Improved RSA lossy trapdoor function and applications. 229-241 - Zhijie Fan, Chengxiang Tan, Xin Li:
A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps. 242-262 - Umer Waqas, Shazia Afzal, Mubeen Akhtar Mir, Muhammad Yousaf:
Cryptographic strength evaluation of AES s-box variants. 263-280 - Amardeep Singh, Monika Singh, Divya Bansal, Sanjeev Sofat:
Optimised K-anonymisation technique to deal with mutual friends and degree attacks. 281-299 - Jayashree D. Gavade, S. R. Chougule, Vishwaja Rathod:
A robust passive blind copy-move image forgery detection. 300-317 - Mamata Rath, Binod Kumar Pattanayak:
Performance evaluation of optimised protocol in MANET. 318-326 - Fadi Abu-Amara, Ameur Bensefia:
A handwriting document encryption scheme based on segmentation and chaotic logarithmic map. 327-343 - Maitreyi Ponguwala, Meda Sreenivasa Rao:
Secured spray and focus protocol design in intermittently connected mobile networks. 344-353 - Iqra Saraf, Avinash K. Shrivastava, Javaid Iqbal:
Effort-based fault detection and correction modelling for multi release of software. 354-379 - Ajeet Singh, Appala Naidu Tentu, V. Ch. Venkaiah:
A dynamic key management paradigm for secure wireless ad hoc network communications. 380-402 - Sunil K. Moon, Rajshree D. Raut:
Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility. 403-439
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.