


default search action
Journal of Information Security and Applications, Volume 19
Volume 19, Number 1, February 2014
- Adrian Waller, Gregorio Martínez Pérez, Félix Gómez Mármol:

Editorial: Special issue on Identity Protection and Management. 1 - Georgios Kambourakis

:
Anonymity and closely related terms in the cyberspace: An analysis by example. 2-17 - Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng:

An efficient and secure anonymous mobility network authentication scheme. 18-24 - Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss:

Concepts and languages for privacy-preserving attribute-based authentication. 25-44 - Younis A. Younis

, Kashif Kifayat
, Madjid Merabti:
An access control model for cloud computing. 45-60 - Sanna Suoranta, Kamran Manzoor, Asko Tontti, Joonas Ruuskanen, Tuomas Aura:

Logout in single sign-on systems: Problems and solutions. 61-77
- Xiaole Fang

, Qianxue Wang
, Christophe Guyeux
, Jacques M. Bahi:
FPGA acceleration of a pseudorandom number generator based on chaotic iterations. 78-87 - Kiavash Satvat, Matthew Forshaw

, Feng Hao
, Ehsan Toreini:
On the privacy of private browsing - A forensic approach. 88-100
Volume 19, Number 2, April 2014
- Steve A. Schneider

, Vanessa Teague, Chris Culnane
, James Heather:
Special Section on Vote-ID 2013. 103-104 - Jurlind Budurushi

, Roman Jöris, Melanie Volkamer:
Implementing and evaluating a software-independent voting system for polling station elections. 105-114 - Bernhard Beckert

, Rajeev Goré, Carsten Schürmann, Thorsten Bormer, Jian Wang:
Verifying voting schemes. 115-129 - Rui Joaquim:

How to prove the validity of a complex ballot encryption to the voter and the public. 130-142
- Mohamed S. Kheir, Heinz Kreft, Reinhard H. Knöchel:

A novel RF fingerprinting approach for hardware integrated security. 143-148 - Seyed Morteza Hosseini, Hossein Karimi, Majid Vafaei Jahan

:
Generating pseudo-random numbers by combining two systems with complex behaviors. 149-162
Volume 19, Number 3, July 2014
- Shujun Li

, Konrad Rieck, Alan Woodward
:
Special issue on threat detection, analysis and defense. 163-164 - Stéphane Paul

, Raphaël Vignon-Davillier
:
Unifying traditional risk assessment approaches with attack trees. 165-181 - Fabrizio Baiardi

, Fabio Corò, Federico Tonelli
, Daniele Sgandurra:
Automating the assessment of ICT risk. 182-193 - Babak Rahbarinia, Roberto Perdisci

, Andrea Lanzi, Kang Li:
PeerRush: Mining for unwanted P2P traffic. 194-208 - Martin Johns

:
Script-templates for the Content Security Policy. 209-223 - Jason C. Cohen, Subrata Acharya:

Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection. 224-244
- Saman Salehi, M. A. Balafar

:
Visual multi secret sharing by cylindrical random grid. 245-255
Volume 19, Numbers 4-5, November 2014
- Sotirios Pirounias, Dimitrios Mermigas, Constantinos Patsakis

:
The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study. 257-271 - Sudipta Kumar Ghosal

, Jyotsna Kumar Mandal
:
Binomial transform based fragile watermarking for image authentication. 272-281 - Marimuthu Karuppiah

, R. Saravanan
:
A secure remote user mutual authentication scheme using smart cards. 282-294 - Partha Sarathi Roy

, Avishek Adhikari:
One-sided leakage-resilient privacy only two-message oblivious transfer. 295-300 - Mohamed S. Kheir, Heinz Kreft, Iris Hölken, Reinhard H. Knöchel:

On the physical robustness of RF on-chip nanostructured security. 301-307 - Chen Sun, Yang Wang, Jun Zheng

:
Dissecting pattern unlock: The effect of pattern strength meter on pattern selection. 308-320
Volume 19, Number 6, December 2014
- Robert Layton, Paul A. Watters

:
A methodology for estimating the tangible cost of data breaches. 321-330 - Kamel Mohamed Faraoun:

A novel fast and provably secure (t, n)-threshold secret sharing construction for digital images. 331-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














