default search action
Journal of Information Security and Applications, Volume 19
Volume 19, Number 1, February 2014
- Adrian Waller, Gregorio Martínez Pérez, Félix Gómez Mármol:
Editorial: Special issue on Identity Protection and Management. 1 - Georgios Kambourakis:
Anonymity and closely related terms in the cyberspace: An analysis by example. 2-17 - Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng:
An efficient and secure anonymous mobility network authentication scheme. 18-24 - Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss:
Concepts and languages for privacy-preserving attribute-based authentication. 25-44 - Younis A. Younis, Kashif Kifayat, Madjid Merabti:
An access control model for cloud computing. 45-60 - Sanna Suoranta, Kamran Manzoor, Asko Tontti, Joonas Ruuskanen, Tuomas Aura:
Logout in single sign-on systems: Problems and solutions. 61-77
- Xiaole Fang, Qianxue Wang, Christophe Guyeux, Jacques M. Bahi:
FPGA acceleration of a pseudorandom number generator based on chaotic iterations. 78-87 - Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
On the privacy of private browsing - A forensic approach. 88-100
Volume 19, Number 2, April 2014
- Steve A. Schneider, Vanessa Teague, Chris Culnane, James Heather:
Special Section on Vote-ID 2013. 103-104 - Jurlind Budurushi, Roman Jöris, Melanie Volkamer:
Implementing and evaluating a software-independent voting system for polling station elections. 105-114 - Bernhard Beckert, Rajeev Goré, Carsten Schürmann, Thorsten Bormer, Jian Wang:
Verifying voting schemes. 115-129 - Rui Joaquim:
How to prove the validity of a complex ballot encryption to the voter and the public. 130-142
- Mohamed S. Kheir, Heinz Kreft, Reinhard H. Knöchel:
A novel RF fingerprinting approach for hardware integrated security. 143-148 - Seyed Morteza Hosseini, Hossein Karimi, Majid Vafaei Jahan:
Generating pseudo-random numbers by combining two systems with complex behaviors. 149-162
Volume 19, Number 3, July 2014
- Shujun Li, Konrad Rieck, Alan Woodward:
Special issue on threat detection, analysis and defense. 163-164 - Stéphane Paul, Raphaël Vignon-Davillier:
Unifying traditional risk assessment approaches with attack trees. 165-181 - Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Daniele Sgandurra:
Automating the assessment of ICT risk. 182-193 - Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li:
PeerRush: Mining for unwanted P2P traffic. 194-208 - Martin Johns:
Script-templates for the Content Security Policy. 209-223 - Jason C. Cohen, Subrata Acharya:
Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection. 224-244
- Saman Salehi, M. A. Balafar:
Visual multi secret sharing by cylindrical random grid. 245-255
Volume 19, Numbers 4-5, November 2014
- Sotirios Pirounias, Dimitrios Mermigas, Constantinos Patsakis:
The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study. 257-271 - Sudipta Kumar Ghosal, Jyotsna Kumar Mandal:
Binomial transform based fragile watermarking for image authentication. 272-281 - Marimuthu Karuppiah, R. Saravanan:
A secure remote user mutual authentication scheme using smart cards. 282-294 - Partha Sarathi Roy, Avishek Adhikari:
One-sided leakage-resilient privacy only two-message oblivious transfer. 295-300 - Mohamed S. Kheir, Heinz Kreft, Iris Hölken, Reinhard H. Knöchel:
On the physical robustness of RF on-chip nanostructured security. 301-307 - Chen Sun, Yang Wang, Jun Zheng:
Dissecting pattern unlock: The effect of pattern strength meter on pattern selection. 308-320
Volume 19, Number 6, December 2014
- Robert Layton, Paul A. Watters:
A methodology for estimating the tangible cost of data breaches. 321-330 - Kamel Mohamed Faraoun:
A novel fast and provably secure (t, n)-threshold secret sharing construction for digital images. 331-340
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.