default search action
Journal of Internet Services and Information Security, Volume 2
Volume 2, Numbers 1/2, February 2012
- Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez:
Towards secure mobile P2P applications using JXME. 1-21 - Karl Andersson:
Interworking Techniques and Architectures for Heterogeneous Wireless Networks. 22-48 - Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, Hui Zhu:
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. 49-58 - Charles J. Zinsmeyer, Turgay Korkmaz:
A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques. 59-72 - Manuel Mazzara, Nicola Dragoni, Mu Zhou:
Implementing Workflow Reconfiguration in WS-BPEL. 73-92 - Atsuko Miyaji, Mohammad Shahriar Rahman:
Private Two-Party Set Intersection Protocol in Rational Model. 93-104 - João Carneiro, João Laranjeira, Goreti Marreiros, Carlos Filipe Freitas, Ricardo Santos:
A Context-aware Model to Support Ubiquitous Group Decision Making. 105-118 - Sang Min Lee, Dong Seong Kim, Jong Sou Park:
A Survey and Taxonomy of Lightweight Intrusion Detection Systems. 119-131
Volume 2, Numbers 3/4, November 2012
- Kangbin Yim, Yoshiaki Hori:
Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2). 1-2 - Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Securing the "Bring Your Own Device" Policy. 3-17 - Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai:
Detecting Information Leakage via a HTTP Request Based on the Edit Distance. 18-28 - Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi:
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks. 29-42 - Ho-Seok Kang, Sung-Ryul Kim:
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System. 43-53 - Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, Pankoo Kim:
A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments. 54-64 - Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing. 65-76 - S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:
Efficient Certificateless Online/Offline Signature. 77-92 - Jeong-Soo Park, KiSeok Bae, YongJe Choi, Dooho Choi, JaeCheol Ha:
A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output. 93-109 - Zhiwei Wang, Guozi Sun, Danwei Chen:
Short signature from factoring assumption in the standard model. 110-117 - Kunwar Singh, C. Pandurangan, A. K. Banerjee:
Lattice Forward-Secure Identity Based Encryption Scheme. 118-128 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Strategic Information Splitting Using Biometric Patterns. 129-133 - Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim:
A Brief Survey on Rootkit Techniques in Malicious Codes. 134-147 - Marek R. Ogiela, Lidia Ogiela:
Personal Identification Based on Cognitive Analysis of Selected Medical Visualization. 148-153
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.