


default search action
International Journal of Information and Computer Security, Volume 15
Volume 15, Number 1, 2021
- Geetika Kovelamudi, Bryan Watson, Jun Zheng

, Srinivas Mukkamala:
On the adoption of scramble keypad for unlocking PIN-protected smartphones. 1-17 - Aafaf Ouaddah, Badr Bellaj:

FairAccess2.0: a smart contract-based authorisation framework for enabling granular access control in IoT. 18-48 - Waqas Haider, Muhammad Wasif Nisar, Tanzila Saba, Muhammad Sharif, Raja Umair Haider, Nadeem Muhammad Bilal, Muhammad Attique Khan

:
A complexity reduced and reliable integrity protection for large relational data over clouds. 49-66 - Ting-Fang Cheng, Ying-Chin Chen, Zhu-Dao Song, Ngoc-Tu Huynh, Jung-San Lee:

Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem. 67-87 - Jitesh Kumar Bhatia

, Anand Singh Jalal
:
Pixel-based hybrid copy move image forgery detection using Zernike moments and auto colour correlogram. 88-107
Volume 15, Numbers 2/3, 2021
- Gul Jabeen, Xi Yang, Ping Luo:

Vulnerability severity prediction model for software based on Markov chain. 109-140 - Dhruti Sharma, Devesh C. Jinwala

:
Multi-writer multi-reader conjunctive keyword searchable encryption. 141-162 - Nour El Houda Senoussi

, Abdelmalik Bachir, Abdelmadjid Bouabdallah:
On QoS-aware location privacy in mobile networks. 163-182 - Ismaila Adeniyi Kamil

, Sunday Oyinlola Ogundoyin
:
A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network. 183-215 - Fagen Song, Tinghuai Ma:

High utility differential privacy based on smooth sensitivity and individual ranking. 216-230 - Oladayo Olufemi Olakanmi:

A lightweight security and privacy-aware routing scheme for energy-constraint multi-hop wireless sensor networks. 231-253 - Boyu Li, Yanheng Liu, Minghai Wang, Geng Sun, Bin Li:

Local anatomy for personalised privacy protection. 254-271 - Shahrzad Sedaghat

:
New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using SDN. 272-298 - Junaid Akram, Majid Mumtaz

, Gul Jabeen, Ping Luo:
DroidMD: an efficient and scalable Android malware detection approach at source code level. 299-321
Volume 15, Number 4, 2021
- Ningning Du, Chongxu Chen:

Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing. 328-342 - Jianchao Zhao:

Research on network security defence based on big data clustering algorithms. 343-356 - Nooh Bany Muhammad, Aya Kandil:

Information protection of end users on the web: privacy issues and measures. 357-372 - Fengming Ma, Gang Sheng, Yuefeng Ma:

E-commerce process reengineering for customer privacy protection. 373-385 - Zhixing Lin, Jian Yu, Shunfa Liu:

The prediction of network security situation based on deep learning method. 386-399 - Parmod Kalia, Divya Bansal, Sanjeev Sofat:

A hybrid approach for preserving privacy for real estate data. 400-410

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














