


default search action
International Journal of Information and Computer Security, Volume 12
Volume 12, Number 1, 2020
- John M. Gray, Gurvirender P. Tejay:
Introducing virtue ethics concepts into the decision processes of information systems trusted workers: a Delphi study. 1-19 - Oladayo Olufemi Olakanmi:
SAPMS: a secure and anonymous parking management system for autonomous vehicles. 20-39 - Jianmin Zhang, Hua Li, Jian Li:
An improved key pre-distribution scheme based on the security level classification of keys for wireless sensor networks. 40-52 - Anil Yadav, Anurag Tripathi, Nitin Rakesh, Sujata Pandey
:
Protecting composite IoT server by secure secret key exchange for XEN intra virtual machines. 53-69 - Amishi Mahesh Kapadia, Nithyanandam Pandian
:
Reversible data hiding methods in integer wavelet transform. 70-89 - Ankit Thakkar
, Kajol Patel:
VIKAS: a new virtual keyboard-based simple and efficient text CAPTCHA verification scheme. 90-105
Volume 12, Numbers 2/3, 2020
- Hridoy Jyoti Mahanta, Ajoy Kumar Khan:
A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks. 112-129 - Srilekha Mukherjee, Goutam Sanyal:
Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique. 130-146 - Shashank Gupta, Brij B. Gupta
, Pooja Chaudhary
:
Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN. 147-180 - Joey Pinto, Pooja Jain
, Tapan Kumar:
Fault prediction for distributed computing Hadoop clusters using real-time higher order differential inputs to SVM: Zedacross. 181-198 - Shelza Suri, Ritu Vijay:
A coupled map lattice-based image encryption approach using DNA and bi-objective genetic algorithm. 199-216 - Vandana Mohindru
, Yashwant Singh
, Ravindara Bhatt
:
Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm. 217-233 - Manoj Diwakar
, Pardeep Kumar:
Blind noise estimation-based CT image denoising in tetrolet domain. 234-252 - P. M. Ashok Kumar, D. Kavitha, S. Arun Kumar:
A hybrid generative-discriminative model for abnormal event detection in surveillance video scenes. 253-268 - Burhan Ul Islam Khan
, Rashidah Funke Olanrewaju
, Farhat Anwar, Roohie Naaz Mir, Mashkuri Yaacob:
Scrutinising internet banking security solutions. 269-302 - Somya Ranjan Sahoo, Brij B. Gupta
:
Fake profile detection in multimedia big data on online social networks. 303-331 - Amrit Kumar Agrawal, Yogendra Narain Singh:
Unconstrained face recognition using deep convolution neural network. 332-348 - Hemraj Shobharam Lamkuche, Dhanya Pramod
:
CSL: FPGA implementation of lightweight block cipher for power-constrained devices. 349-377
Volume 12, Number 4, 2020
- Xin Xie, Jianan Wang, Songlin Ge, Nan Jiang, Fengping Hu:
An improved spatial-temporal correlation algorithm combined with compressed sensing and LEACH protocol in WSNs. 383-396 - Chundong Wang, Tong Zhao, Zheli Liu:
An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm. 397-415 - Chundong Wang, Lei Yang, Hao Guo, Fujin Wan:
Data protection and provenance in cloud of things environment: research challenges. 416-435 - Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji:
Advanced security of two-factor authentication system using stego QR code. 436-449 - Assia Merzoug, Adda Ali-Pacha
, Naima Hadj-Said:
New chaotic cryptosystem for the image encryption. 450-463

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.