


default search action
Journal of Information Security and Applications, Volume 37
Volume 37, December 2017
- Stavros D. Nikolopoulos, Iosif Polenakis:

Preventing malware pandemics in mobile devices by establishing response-time bounds. 1-14 - Apurva S. Kittur, Alwyn Roshan Pais

:
Batch verification of Digital Signatures: Approaches and challenges. 15-27 - Ahmed Mahfouz, Tarek M. Mahmoud

, Ahmed Sharaf Eldin
:
A survey on behavioral biometric authentication on smartphones. 28-37 - Vidhi Khanduja

:
Database watermarking, a technological protective measure: Perspective, security analysis and future directions. 38-49 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:

Attribute based access control scheme with controlled access delegation for collaborative E-health environments. 50-64 - Deep Chandra Mishra, R. K. Sharma, Saurav Suman, Akhilesh Prasad:

Multi-layer security of color image based on chaotic system combined with RP2DFRFT and Arnold Transform. 65-90 - Abdurrahman Pektas, Tankut Acarman

:
Classification of malware families based on runtime behaviors. 91-100 - Abdulhadi Shoufan, Ernesto Damiani

:
On inter-Rater reliability of information security experts. 101-111 - Libing Wu

, Jing Wang, Kim-Kwang Raymond Choo
, Yuangang Li, Debiao He:
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network. 112-121

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














