


default search action
Information Security Journal: A Global Perspective, Volume 20
Volume 20, Number 1, 2011
- Md. Enamul Kabir

, Hua Wang
:
Microdata Protection Method Through Microaggregation: A Median-Based Approach. 1-8 - G. P. Biswas:

Establishment of Authenticated Secret Session Keys Using Digital Signature Standard. 9-16 - Panagiota Lagou, Gregory Chondrokoukis:

Choosing a Biometric for Nonrepudiation. 17-24 - Rashid Sheikh

, Durgesh Kumar Mishra
, Beerendra Kumar:
Secure Multiparty Computation: From Millionaires Problem to Anonymizer. 25-33 - Jonathan Matusitz:

Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo. 34-44 - Rajesh Kumar Tiwari

, G. Sahoo Mesra:
A Novel Methodology for Data Hiding in PDF Files. 45-57 - Kevin L. McLaughlin:

Cyber Attack! Is a Counter Attack Warranted? 58-64
Volume 20, Number 2, 2011
- Nicolas Sklavos

:
Editorial. 65-66
- Sandeep K. Sood

:
Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards. 67-77 - S. Geetha

, N. Kamaraj:
MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure. 78-90 - Jeff Stapleton, Ralph Spencer Poore

:
Tokenization and Other Methods of Security for Cardholder Data. 91-99 - Sandeep K. Sood

:
Cookie-Based Virtual Password Authentication Protocol. 100-111 - Uloli Thiruvaazhi

, R. Divya:
Web Authentication Protocol Using Zero Knowledge Proof. 112-121
Volume 20, Number 3, 2011
- Derek Mohammed:

Security in Cloud Computing: An Analysis of Key Drivers and Constraints. 123-127 - Priti Sikdar:

Alternate Approaches to Business Impact Analysis. 128-134 - Osama S. Faragallah

:
An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications. 135-147 - N. V. Rao, V. Meena Kumari:

Watermarking in Medical Imaging for Security and Authentication. 148-155 - Mohini Bhardwaj, Amar Jeet Singh:

Automated Integrated Examination System: A Security Concern. 156-162 - Sirisha Surisetty, Sanjeev Kumar:

Apple's Leopard Versus Microsoft's Windows XP: Experimental Evaluation of Apple's Leopard Operating System with Windows XP-SP2 under Distributed Denial of Service Security Attacks. 163-172
Volume 20, Numbers 4-5, 2011
- R. Saminathan, K. Selvakumar:

TRUCE - An Adaptive Trust Management Algorithm Over MANET for Service-Based Mobile Computing Environments. 173-184 - J. Arokia Renjit

, K. L. Shunmuganathan
:
Multi-Agent-Based Anomaly Intrusion Detection. 185-193 - Rachid Beghdad

, Mohamed Touati, Mohamed Seghir Berboucha:
A Data Analysis-Based Approach for Detecting Intruders. 194-209 - Sourav Mukherjee, Bibhudatta Sahoo

:
A Survey on Hardware Implementation of IDEA Cryptosystem. 210-218 - Karthikeyan Shanmugam, Roger S. Powell

, Tom Owens
:
An Approach for Validation of Digital Anti-Forensic Evidence. 219-230 - Azzam Mourad

, Hadi Otrok
, Lama Baajour:
New Approach Targeting Security Patterns Development and Deployment. 231-244 - E. S. Ismail, N. M. F. Tahat:

The Modified Signature Scheme Based on Factoring and Discrete Logarithms. 245-249 - Saju P. John

, Philip Samuel:
A Predictive Clustering Technique for Effective Key Management in Mobile Ad Hoc Networks. 250-260
- Larry Marks:

Hardening Network Security, by Mallery, J., Zahn, J., Kelly, P., Noonan, W., Seagren, E., Love, P., Kraft, R., and O'Neill, M.(2005). CA: McGraw-Hill/Osborne. (608 pp., $ 39.99 USD, ISBN: 978-0072257038). 261
Volume 20, Number 6, 2011
- Edward A. Morse

, Vasant Raval, John R. Wingender Jr.:
Market Price Effects of Data Security Breaches. 263-273 - Amit Phadikar, Santi P. Maity

:
On Security of Compressed Gray Scale Image Using Joint Encryption and Data Hiding. 274-289 - Vandana Gandotra, Archana Singhal

, Punam Bedi
:
MASPTA-O: Multiagent System Planning to Avoid Threats Optimally. 290-310 - Eric H. Corwin:

Deep Packet Inspection: Shaping the Internet and the Implications on Privacy and Security. 311-316 - R. Mynuddin Sulthani, D. Sreenivasa Rao:

A QoS Estimation-Based Scheduler for Real-Time Traffic in IEEE 802.11e Mobile Ad hoc Networks. 317-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














