default search action
Information Security Journal: A Global Perspective, Volume 22
Volume 22, Number 1, 2013
- Kaleem Usmani, Amar Kumar Mohapatra, Nupur Prakash:
An Improved Framework for Incident Handling. 1-9 - Abhishek Basu, Subir Kumar Sarkar:
On the Implementation of Robust Copyright Protection Scheme Using Visual Attention Model. 10-20 - Manjot Bhatia, Sunil Kumar Muttoo, Mahinder Pal Singh Bhatia:
Secure Group Communication with Hidden Group Key. 21-34 - Udai Pratap Rao, Dhiren R. Patel:
Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions. 35-45 - Lunzhi Deng, Chenglian Liu, Xiangbin Wang:
An Improved Identity-Based Ring Signcryption Scheme. 46-54
Volume 22, Number 2, 2013
- Shellie Wedman, Annette Tetmeyer, Hossein Saiedian:
An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking Attacks. 55-67 - Vik Pant, William P. Wagner:
Hyper-Encryption: Eternal Secrecy Using the Bounded Storage and Limited Access Models. 68-82 - Abdelrahman Desoky:
Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm - High Level of Security for Fooling the Enemy. 83-97 - Arun Vijayaragavan, P. Mohan Kumar, K. L. Shunmuganathan:
Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory. 98-103
Volume 22, Number 3, 2013
- Rajesh Kumar Tiwari, Gadadhar Sahoo:
A Novel Watermarking Scheme for Secure Relational Databases. 105-116 - Shilpa Kaman, K. Swetha, Syed Akram, G. Varaprasad:
Remote User Authentication Using a Voice Authentication System. 117-125 - Apostolos P. Fournaris:
A Distributed Approach of a Threshold Certificate-Based Encryption Scheme with No Trusted Entities. 126-139 - Shabana Kazi, Mark Stamp:
Hidden Markov Models for Software Piracy Detection. 140-149
Volume 22, Number 4, 2013
- Stilianos Vidalis, Olga Angelopoulou:
Deception and Maneuver Warfare Utilizing Cloud Resources. 151-158 - Osama Hayatle, Hadi Otrok, Amr M. Youssef:
A Markov Decision Process Model for High Interaction Honeypots. 159-170 - Eyong B. Kim:
Information Security Awareness Status of Business College: Undergraduate Students. 171-179 - Eben I. Kaplan:
Tackling the Password Problem: Image- and Gesture-Based Alternatives to Alphanumeric Passwords. 180-186 - Michael Workman, Daniel C. Phelps, Robert C. Hare:
A Study of Performative Hactivist Subcultures and Threats to Businesses. 187-200
- Larry Marks:
Inside Cyber Warfare, Mapping the Cyber Underworld, by Carr, Jeffrey 2nd ed, Newton, MA: O'Reilly Media, 2012, 318p., $39.99. ISBN 978-1-449-31004-2. 201-202 - Nicolas Sklavos:
C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.CreateSpace Independent Publishing Platform, 2013, 102p., $36.99. ISBN 1480237418. 203
Volume 22, Numbers 5-6, 2013
- Giorgio Di Natale:
TRUDEVICE: A COST Action on Trustworthy Manufacturing and Utilization of Secure Devices. 205-207
- Ariel Burg, Osnat Keren:
On the Efficiency of Berger Codes Against Error Injection Attacks on Parallel Asynchronous Communication Channels. 208-215 - Igor Shumsky, Osnat Keren:
Enhancement of Hardware Security by Hamming-Ball Based State Assignment. 216-225 - Sophie Dupuis, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre:
On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis. 226-236 - Diego Alberto, Paolo Maistri, Régis Leveugle:
Forecasting the Effects of Electromagnetic Fault Injections on Embedded Cryptosystems. 237-243 - Mikhail Platonov, Josef Hlavác, Róbert Lórencz:
Using Power-Up SRAM State of Atmel ATmega1284P Microcontrollers as Physical Unclonable Function for Key Generation and Chip Identification. 244-250 - Feng Lu, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre:
Multilevel Ionizing-Induced Transient Fault Simulator. 251-264 - Linus Feiten, Andreas Spilla, Matthias Sauer, Tobias Schubert, Bernd Becker:
Implementation and Analysis of Ring Oscillator PUFs on 60 nm Altera Cyclone FPGAs. 265-273
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.