


default search action
Journal of Information Security and Applications, Volume 30
Volume 30, October 2016
- Erkam Lüy, Zekeriya Y. Karatas, Hüseyin Ergin:

Comment on "An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)". 1-2 - Hedieh Sajedi

:
Steganalysis based on steganography pattern discovery. 3-14 - Leandros A. Maglaras

, Jianmin Jiang, Tiago J. Cruz
:
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. 15-26 - Simon Parkinson

, Andrew Crampton
:
Identification of irregularities and allocation suggestion of relative file system permissions. 27-39 - Jianghong Wei

, Wenfen Liu, Xuexian Hu:
Security pitfalls of "ePASS: An expressive attribute-based signature scheme". 40-45 - Michele Bugliesi

, Stefano Calzavara
, Sebastian Mödersheim
, Paolo Modesti
:
Security protocol specification and verification with AnBx. 46-63 - Ankita Chaturvedi, Ashok Kumar Das

, Dheerendra Mishra
, Sourav Mukhopadhyay:
Design of a secure smart card-based multi-server authentication scheme. 64-80 - Patricia Ghann, Shiguang Ju, Conghua Zhou:

Testing access control policy through Change Rule and Swap Rule Algorithm (CRSR). 81-93 - H. Dadgostar, Fatemeh Afsari:

Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. 94-104 - Jalesh Kumar

, Shivananda Nirmala:
A novel and efficient method based on knight moves for securing the information contents of images - A parallel approach. 105-117

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














