


default search action
International Journal of Information Security and Privacy, Volume 12
Volume 12, Number 1, 2018
- Ranjeet Kumar Singh

, Dilip Kumar Shaw
:
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security. 1-12 - Gautam Kumar

, Hemraj Saini
:
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification. 13-28 - Arun Malik

, Babita Pandey
:
CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET. 29-41 - Geetanjali Rathee, Hemraj Saini

:
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN. 42-52 - Gulshan Kumar

, Rahul Saha
, Mandeep Singh, Mritunjay Kumar Rai:
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. 53-62 - Rajeev Sobti, G. Geetha

:
Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex-M4 Processor. 63-73 - Rajni Mohana:

A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation. 74-88 - Puneet Kumar Kaushal, Rajeev Sobti:

Breaching Security of Full Round Tiny Encryption Algorithm. 89-98
Volume 12, Number 2, 2018
- Malay Kumar, Manu Vardhan

:
Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis. 1-25 - Geetanjali Rathee, Hemraj Saini

:
Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN. 26-37 - Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati

:
A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks. 38-45 - Muzzammil Hussain

, Neha Kaliya
:
An Improvised Framework for Privacy Preservation in IoT. 46-63
Volume 12, Number 3, 2018
- Noushin Ashrafi, Jean-Pierre Kuilboer:

A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia. 1-15 - Bouchra Echandouri

, Fouzia Omary, Fatima Ezzahra Ziani
, Anas Sadak
:
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm. 16-26 - Hridoy Jyoti Mahanta, Ajoy Kumar Khan:

Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem. 27-41 - S. Geetha

, P. Punithavathi, A. Magnus Infanteena, Siva S. Sivatha Sindhu:
A Literature Review on Image Encryption Techniques. 42-83 - Venkata Udaya Sameer, Ruchira Naskar

:
Blind Image Source Device Identification: Practicality and Challenges. 84-99 - Benjamin Stark, Heiko Gewald, Heinrich Lautenbacher, Ulrich Haase, Siegmar Ruff:

Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data. 100-122 - B. S. Kiruthika Devi

, T. Subbulakshmi
, K. V. Mahesh Babu:
A Survey of Security Models Using Effective Moving Target Defenses. 123-140 - S. Vijayarani Mohan, Tamilarasi Angamuthu

:
Association Rule Hiding in Privacy Preserving Data Mining. 141-163
Volume 12, Number 4, 2018
- Martin Konan

, Wenyong Wang:
Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω). 1-23 - Atefeh Khazaei

, Mohammad Ghasemzadeh
, Christoph Meinel:
VuWaDB: A Vulnerability Workaround Database. 24-34 - Rohit M. Thanki

, Komal R. Borisagar:
Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking. 35-53 - Charifa Hanin, Fouzia Omary, Souad El Bernoussi, Khadija Achkoun, Bouchra Echandouri

:
A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO). 54-67 - Xueping Liang

, Sachin Shetty
, Deepak K. Tosh
, Juan Zhao, Danyi Li, Jihong Liu:
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain. 68-81 - Patryk Szewczyk

, Krishnun Sansurooah, Patricia A. H. Williams
:
An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards. 82-97

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














