default search action
Journal of Information Security and Applications, Volume 43
Volume 43, December 2018
- Gita Donkal, Gyanendra K. Verma:
A multimodal fusion based framework to reinforce IDS for securing Big Data environment using Spark. 1-11 - Assia Hammamouche, Mawloud Omar, Nabil Djebari, Abdelkamel Tari:
Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. 12-20 - Mohamed Amine Rguibi, Najem Moussa:
Hybrid Trust Model for Worm Mitigation in P2P Networks. 21-36 - Zhaozhi Xie, Wei Lu, Xianjin Liu, Yingjie Xue, Yuileong Yeung:
Copy-move detection of digital audio based on multi-feature decision. 37-46 - Zhaotong Li, Ying He:
Steganography with pixel-value differencing and modulus function based on PSO. 47-52 - Hui Qi, Xiaoqiang Di, Jinqing Li:
Formal definition and analysis of access control model based on role and attribute. 53-60 - Fortune Munodawafa, Ali Ismail Awad:
Security risk assessment within hybrid data centers: A case study of delay sensitive applications. 61-72
- Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali A. Ghorbani:
OTP-IoT: An ownership transfer protocol for the Internet of Things. 73-82 - Tushar Kanti Saha, Takeshi Koshiba:
Outsourcing private equality tests to the cloud. 83-98
- Shahram Khazaei, Mehri Rezaei-Aliabadi:
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework. 99-109 - Elias Bou-Harb, Nasir Ghani, Abdelkarim Erradi, Khaled Bashir Shaban:
Passive inference of attacks on CPS communication protocols. 110-122 - Sunil Kumar, Manish Kumar, Rajat Budhiraja, Mrinal Kanti Das, Sanjeev Singh:
A cryptographic model for better information security. 123-138
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.