Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Information Security

ISSN: 2153--1234
Publisher: Scientific Research Publishing


ADD TO MY LIST
 
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models

Author(s): Alfredo Maesa | Fabio Garzia | Michele Scarpiniti | Roberto Cusani
Volume: 03
Issue: 04
Year: 2012
Dynamic Identity Based Authentication Protocol for Two-Server Architecture

Author(s): Sandeep K. Sood
Volume: 03
Issue: 04
Year: 2012
Simultaneous Hashing of Multiple Messages

Author(s): Shay Gueron | Vlad Krasnov
Volume: 03
Issue: 04
Year: 2012
State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming

Author(s): Mario Góngora-Blandón | Miguel Vargas-Lombardo
Volume: 03
Issue: 04
Year: 2012
Identifier Migration for Identity Continuance in Single Sign-On

Author(s): Yoshio Kakizaki | Kazunari Maeda | Keiichi Iwamura
Volume: 03
Issue: 04
Year: 2012
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture

Author(s): Amir Mohamed Talib | Rodziah Atan | Rusli Abdullah | Masrah Azrifah Azmi Murad
Volume: 03
Issue: 04
Year: 2012
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents

Author(s): Thomas Djotio Ndié | Claude Tangha | Guy Bertrand Fopak
Volume: 03
Issue: 04
Year: 2012
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol

Author(s): Moad Mowafi | Lo'ai Tawalbeh | Walid Aljoby | Mohammad Al-Rousan
Volume: 03
Issue: 04
Year: 2012
Category-Based Intrusion Detection Using PCA

Author(s): Gholam Reza Zargar | Tania Baghaie
Volume: 03
Issue: 04
Year: 2012
Secure Messaging Implementation in OpenSC

Author(s): Maurizio Talamo | Maulahikmah Galinium | Christian H. Schunck | Franco Arcieri
Volume: 03
Issue: 04
Year: 2012
Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case

Author(s): Qingquan Sun | Peng Wu | Yeqing Wu | Mengcheng Guo | Jiang Lu
Volume: 03
Issue: 04
Year: 2012
Tanimoto Based Similarity Measure for Intrusion Detection System

Author(s): Alok Sharma | Sunil Pranit Lal
Volume: 02
Issue: 04
Year: 2011
Key Incorporation Scheme for Cancelable Biometrics

Author(s): Eliza Yingzi Du | Kai Yang | Zhi Zhou
Volume: 02
Issue: 04
Year: 2011
On Secure Digital Image Watermarking Techniques

Author(s): Manjit Thapa | Sandeep Kumar Sood
Volume: 02
Issue: 04
Year: 2011
Anomalous Network Packet Detection Using Data Stream Mining

Author(s): Zachary Miller | William Deitrick | Wei Hu
Volume: 02
Issue: 04
Year: 2011
Vulnerabilities of LDAP As An Authentication Service

Author(s): Charlie Obimbo | Benjamin Ferriman
Volume: 02
Issue: 04
Year: 2011
New Approach for Fast Color Image Encryption Using Chaotic Map

Author(s): Kamlesh Gupta | Sanjay Silakari
Volume: 02
Issue: 04
Year: 2011
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons

Author(s): Mario Marco Corbelli | Fabio Garzia | Roberto Cusani
Volume: 04
Issue: 03
Year: 2013
A Novel Solution to Handle DDOS Attack in MANET

Author(s): Meghna Chhabra | Brij Gupta | Ammar Almomani
Volume: 04
Issue: 03
Year: 2013
Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks

Author(s): Shweta Tripathi | Brij Gupta | Ammar Almomani | Anupama Mishra | Suresh Veluru
Volume: 04
Issue: 03
Year: 2013
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth

Author(s): Lance Cleghorn
Volume: 04
Issue: 03
Year: 2013
Web Security and Log Management: An Application Centric Perspective

Author(s): Andrew Mwaura Kahonge | William Okello-Odongo | Evans K. Miriti | Elisha Abade
Volume: 04
Issue: 03
Year: 2013
Diffusion Analysis of Message Expansion in STITCH-256

Author(s): Norziana Jamil | Ramlan Mahmod | Muhammad Reza Z’aba | Nur Izura Udzir | Zuriati Ahmad Zukarnain
Volume: 04
Issue: 03
Year: 2013
Feedback Reliability Ratio of an Intrusion Detection System

Author(s): Usha Banerjee | Gaurav Batra | K. V. Arya
Volume: 03
Issue: 03
Year: 2012
Perception on Cyber Terrorism: A Focus Group Discussion Approach

Author(s): Rabiah Ahmad | Zahri Yunos | Shahrin Sahib | Mariana Yusoff
Volume: 03
Issue: 03
Year: 2012
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs

Author(s): Aziz Baayer | Nourddine Enneya | Mohammed Elkoutbi
Volume: 03
Issue: 03
Year: 2012
Data Stream Subspace Clustering for Anomalous Network Packet Detection

Author(s): Zachary Miller | Wei Hu
Volume: 03
Issue: 03
Year: 2012
The Application of Mixed Method in Developing a Cyber Terrorism Framework

Author(s): Rabiah Ahmad | Zahri Yunos
Volume: 03
Issue: 03
Year: 2012
A New Steganography Method Based on the Complex Pixels

Author(s): Amin Hashemi Pour | Ali Payandeh
Volume: 03
Issue: 03
Year: 2012
Digital Forensics and Cyber Crime Datamining

Author(s): K. K. Sindhu | B. B. Meshram
Volume: 03
Issue: 03
Year: 2012
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

Author(s): Archana Tiwari | Manisha Sharma
Volume: 03
Issue: 03
Year: 2012
The Extended Tanh Method for Compactons and Solitons Solutions for the CH(n,2n – 1,2n,–n) Equations

Author(s): Xinqian Lin | Shengqiang Tang | Wentao Huang
Volume: 03
Issue: 03
Year: 2012
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks

Author(s): Hari Krishna Vellalacheruvu | Sanjeev Kumar
Volume: 02
Issue: 03
Year: 2011
Proactive Security Mechanism and Design for Firewall

Author(s): Saleem-Ullah Lar | Xiaofeng Liao | Aqeel ur Rehman | MA Qinglu
Volume: 02
Issue: 03
Year: 2011
McAfee SecurityCenter Evaluation under DDoS Attack Traffic

Author(s): Sirisha Surisetty | Student Member | Sanjeev Kumar
Volume: 02
Issue: 03
Year: 2011
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression

Author(s): Shinichi Murata | Yasunari Yoshitomi | Hiroaki Ishii
Volume: 02
Issue: 03
Year: 2011
A Formal Model of Conformity and Security Testing of Inheritance for Object Oriented Constraint Programming

Author(s): Khalid Benlhachmi | Mohammed Benattou
Volume: 04
Issue: 02
Year: 2013
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing

Author(s): Abou-el-ela Abdou Hussien | Nermin Hamza | Hesham A. Hefny
Volume: 04
Issue: 02
Year: 2013
ISO/IEC 27000, 27001 and 27002 for Information Security Management

Author(s): Georg Disterer
Volume: 04
Issue: 02
Year: 2013
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations

Author(s): Maria Chroni | Angelos Fylakis | Stavros D. Nikolopoulos
Volume: 04
Issue: 02
Year: 2013
RFID Applications: Prospects and Challenges in Bangladesh

Author(s): Abdul Kadar Muhammad Masum | Faruk Bhuiyan | Kazi Golam Azam
Volume: 04
Issue: 02
Year: 2013
The Package Concept for Enforcing Usage Control

Author(s): Patricia Ghann | Changda Wang | Conghua Zhou
Volume: 04
Issue: 02
Year: 2013
A Fair Electronic Cash System with Identity-Based Group Signature Scheme

Author(s): Khalid. O. Elaalim | Shoubao Yang
Volume: 03
Issue: 02
Year: 2012
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS

Author(s): Ahmad Bakhtiyari Shahri | Zuraini Ismail
Volume: 03
Issue: 02
Year: 2012
Effect of Network Traffic on IPS Performance

Author(s): Shahriar Mohammadi | Vahid Allahvakil | Mojtaba Khaghani
Volume: 03
Issue: 02
Year: 2012
Digital Image Watermarking Based on Mixed Error Correcting Code

Author(s): Yonghong Chen | Jiancong Chen
Volume: 03
Issue: 02
Year: 2012
Detecting Threats of Acoustic Information Leakage Through Fiber Optic Communications

Author(s): Vladimir V. Grishachev
Volume: 03
Issue: 02
Year: 2012
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks

Author(s): Ming Tong | Tao Chen | Wei Zhang | Linna Dong
Volume: 03
Issue: 02
Year: 2012
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks

Author(s): Sanjeev Kumar | Raja Sekhar Reddy Gade
Volume: 03
Issue: 02
Year: 2012
Digital Evidence for Database Tamper Detection

Author(s): Shweta Tripathi | Bandu Baburao Meshram
Volume: 03
Issue: 02
Year: 2012
Privacy Preserving Scheme for Location-Based Services

Author(s): Youssef Gahi | Mouhcine Guennoun | Zouhair Guennoun | Khalil El-Khatib
Volume: 03
Issue: 02
Year: 2012
A Visual Cryptography Based Digital Image Copyright Protection

Author(s): Adel Hammad Abusitta
Volume: 03
Issue: 02
Year: 2012
A Robust Method to Detect Hidden Data from Digital Images

Author(s): Romany F. Mansour | W. F. Awwad | A. A. Mohammed
Volume: 03
Issue: 02
Year: 2012
Reference Encryption for Access Right Segregation and Domain Representation

Author(s): Lanfranco Lopriore
Volume: 03
Issue: 02
Year: 2012
Determinants in Human Gait Recognition

Author(s): Tahir Amin | Dimitrios Hatzinakos
Volume: 03
Issue: 02
Year: 2012
Hardware Performance Evaluation of SHA-3 Candidate Algorithms

Author(s): Yaser Jararweh | Lo’ai Tawalbeh | Hala Tawalbeh | Abidalrahman Moh’d
Volume: 03
Issue: 02
Year: 2012
Secure Spread-Spectrum Watermarking for Telemedicine Applications

Author(s): Basant Kumar | Harsh Vikram Singh | Surya Pal Singh | Anand Mohan
Volume: 02
Issue: 02
Year: 2011
Proposed Framework for Security Risk Assessment

Author(s): Zakaria I. Saleh | Heba Refai | Ahmad Mashhour
Volume: 02
Issue: 02
Year: 2011
A Comparison of Link Layer Attacks on Wireless Sensor Networks

Author(s): Shahriar Mohammadi | Reza Ebrahimi Atani | Hossein Jadidoleslamy
Volume: 02
Issue: 02
Year: 2011
An Authentication Method for Digital Audio Using a Discrete Wavelet Transform

Author(s): Yasunari Yoshitomi | Taro Asada | Yohei Kinugawa | Masayoshi Tabuse
Volume: 02
Issue: 02
Year: 2011
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment

Author(s): Sanjeev Kumar | Orifiel Gomez
Volume: 01
Issue: 02
Year: 2010
iPhone Security Analysis

Author(s): Vaibhav Ranchhoddas Pandya | Mark Stamp
Volume: 01
Issue: 02
Year: 2010
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability

Author(s): V. Prashyanusorn | Y. Fujii | S. Kaviya | S. Mitatha | P. P. Yupapin
Volume: 01
Issue: 02
Year: 2010
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V

Author(s): Yongjian Li | Jun Pang
Volume: 01
Issue: 02
Year: 2010
Extending the Strand Space Method with Timestamps: Part I the Theory

Author(s): Yongjian Li | Jun Pang
Volume: 01
Issue: 02
Year: 2010
A j-Lanes Tree Hashing Mode and j-Lanes SHA-256

Volume: 04
Issue: 01
Year: 2013
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET

Author(s): Tat Wing Chim | Jeanno Chin Long Cheung | Siu Ming Yiu | Lucas Chi Kwong Hui | Victor On Kwok Li
Volume: 03
Issue: 01
Year: 2011
Evaluation of Electrocardiogram for Biometric Authentication

Author(s): Yogendra Narain Singh | S K Singh
Volume: 03
Issue: 01
Year: 2011
Security Policy Management Process within Six Sigma Framework

Author(s): Vijay Anand | Jafar Saniie | Erdal Oruklu
Volume: 03
Issue: 01
Year: 2011
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment

Author(s): Ilung Pranata | Geoff Skinner | Rukshan Athauda
Volume: 03
Issue: 01
Year: 2011
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy

Author(s): Yuji Waizumi | Hiroshi Tsunoda | Masashi Tsuji | Yoshiaki Nemoto
Volume: 03
Issue: 01
Year: 2011
Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem

Author(s): Rasim Alguliyev | Saadat Nazirova
Volume: 03
Issue: 01
Year: 2011
Random but System-Wide Unique Unlinkable Parameters

Author(s): Peter Schartner
Volume: 03
Issue: 01
Year: 2011
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks

Author(s): Sanjeev Kumar | Raja Sekhar Reddy Gade
Volume: 02
Issue: 01
Year: 2011
Effective and Extensive Virtual Private Network

Author(s): Tarek S. Sobh | Yasser Aly
Volume: 02
Issue: 01
Year: 2011
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems

Author(s): Indraneel Mukhopadhyay | Mohuya Chakraborty | Satyajit Chakrabarti
Volume: 02
Issue: 01
Year: 2011
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network

Author(s): Shaojun Zhang | Shanshan Song
Volume: 02
Issue: 01
Year: 2011
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms

Author(s): Tao Xu | Chunxiao Yi
Volume: 02
Issue: 01
Year: 2011
Game Theory Based Network Security

Author(s): Yi Luo | Ferenc Szidarovszky | Youssif Al-Nashif | Salim Hariri
Volume: 01
Issue: 01
Year: 2010
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme

Author(s): Jeddy Nafeesa Begum | Krishnan Kumar | Vembu Sumathy
Volume: 01
Issue: 01
Year: 2010
Eliminating Forgers Based on Intra Trial Variability in Online Signature Verification Using Handglove and Photometric Signals

Author(s): Andrews Samraj | Shohel Sayeed | Loo Chu Kiong | Nikos E. Mastorokis
Volume: 01
Issue: 01
Year: 2010
Fast Forgery Detection with the Intrinsic Resampling Properties

Author(s): Cheng-Chang Lien | Cheng-Lun Shih | Chih-Hsun Chou
Volume: 01
Issue: 01
Year: 2010
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace

Author(s): Hui Lin | Gyungho Lee
Volume: 01
Issue: 01
Year: 2010
Why do you need a reservation system?      Affiliate Program