Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Information Security

ISSN: 2153--1234
Publisher: Scientific Research Publishing


ADD TO MY LIST
 
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons

Author(s): Mario Marco Corbelli | Fabio Garzia | Roberto Cusani
Volume: 04
Issue: 03
Year: 2013
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth

Author(s): Lance Cleghorn
Volume: 04
Issue: 03
Year: 2013
Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks

Author(s): Shweta Tripathi | Brij Gupta | Ammar Almomani | Anupama Mishra | Suresh Veluru
Volume: 04
Issue: 03
Year: 2013
Diffusion Analysis of Message Expansion in STITCH-256

Author(s): Norziana Jamil | Ramlan Mahmod | Muhammad Reza Z’aba | Nur Izura Udzir | Zuriati Ahmad Zukarnain
Volume: 04
Issue: 03
Year: 2013
A Novel Solution to Handle DDOS Attack in MANET

Author(s): Meghna Chhabra | Brij Gupta | Ammar Almomani
Volume: 04
Issue: 03
Year: 2013
Web Security and Log Management: An Application Centric Perspective

Author(s): Andrew Mwaura Kahonge | William Okello-Odongo | Evans K. Miriti | Elisha Abade
Volume: 04
Issue: 03
Year: 2013
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing

Author(s): Abou-el-ela Abdou Hussien | Nermin Hamza | Hesham A. Hefny
Volume: 04
Issue: 02
Year: 2013
The Package Concept for Enforcing Usage Control

Author(s): Patricia Ghann | Changda Wang | Conghua Zhou
Volume: 04
Issue: 02
Year: 2013
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations

Author(s): Maria Chroni | Angelos Fylakis | Stavros D. Nikolopoulos
Volume: 04
Issue: 02
Year: 2013
A Formal Model of Conformity and Security Testing of Inheritance for Object Oriented Constraint Programming

Author(s): Khalid Benlhachmi | Mohammed Benattou
Volume: 04
Issue: 02
Year: 2013
ISO/IEC 27000, 27001 and 27002 for Information Security Management

Author(s): Georg Disterer
Volume: 04
Issue: 02
Year: 2013
RFID Applications: Prospects and Challenges in Bangladesh

Author(s): Abdul Kadar Muhammad Masum | Faruk Bhuiyan | Kazi Golam Azam
Volume: 04
Issue: 02
Year: 2013
A j-Lanes Tree Hashing Mode and j-Lanes SHA-256

Volume: 04
Issue: 01
Year: 2013
Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case

Author(s): Qingquan Sun | Peng Wu | Yeqing Wu | Mengcheng Guo | Jiang Lu
Volume: 03
Issue: 04
Year: 2012
Category-Based Intrusion Detection Using PCA

Author(s): Gholam Reza Zargar | Tania Baghaie
Volume: 03
Issue: 04
Year: 2012
Dynamic Identity Based Authentication Protocol for Two-Server Architecture

Author(s): Sandeep K. Sood
Volume: 03
Issue: 04
Year: 2012
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents

Author(s): Thomas Djotio Ndié | Claude Tangha | Guy Bertrand Fopak
Volume: 03
Issue: 04
Year: 2012
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models

Author(s): Alfredo Maesa | Fabio Garzia | Michele Scarpiniti | Roberto Cusani
Volume: 03
Issue: 04
Year: 2012
Identifier Migration for Identity Continuance in Single Sign-On

Author(s): Yoshio Kakizaki | Kazunari Maeda | Keiichi Iwamura
Volume: 03
Issue: 04
Year: 2012
State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming

Author(s): Mario Góngora-Blandón | Miguel Vargas-Lombardo
Volume: 03
Issue: 04
Year: 2012
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol

Author(s): Moad Mowafi | Lo'ai Tawalbeh | Walid Aljoby | Mohammad Al-Rousan
Volume: 03
Issue: 04
Year: 2012
Simultaneous Hashing of Multiple Messages

Author(s): Shay Gueron | Vlad Krasnov
Volume: 03
Issue: 04
Year: 2012
Secure Messaging Implementation in OpenSC

Author(s): Maurizio Talamo | Maulahikmah Galinium | Christian H. Schunck | Franco Arcieri
Volume: 03
Issue: 04
Year: 2012
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture

Author(s): Amir Mohamed Talib | Rodziah Atan | Rusli Abdullah | Masrah Azrifah Azmi Murad
Volume: 03
Issue: 04
Year: 2012
Digital Forensics and Cyber Crime Datamining

Author(s): K. K. Sindhu | B. B. Meshram
Volume: 03
Issue: 03
Year: 2012
Data Stream Subspace Clustering for Anomalous Network Packet Detection

Author(s): Zachary Miller | Wei Hu
Volume: 03
Issue: 03
Year: 2012
Feedback Reliability Ratio of an Intrusion Detection System

Author(s): Usha Banerjee | Gaurav Batra | K. V. Arya
Volume: 03
Issue: 03
Year: 2012
A New Steganography Method Based on the Complex Pixels

Author(s): Amin Hashemi Pour | Ali Payandeh
Volume: 03
Issue: 03
Year: 2012
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs

Author(s): Aziz Baayer | Nourddine Enneya | Mohammed Elkoutbi
Volume: 03
Issue: 03
Year: 2012
Perception on Cyber Terrorism: A Focus Group Discussion Approach

Author(s): Rabiah Ahmad | Zahri Yunos | Shahrin Sahib | Mariana Yusoff
Volume: 03
Issue: 03
Year: 2012
The Extended Tanh Method for Compactons and Solitons Solutions for the CH(n,2n – 1,2n,–n) Equations

Author(s): Xinqian Lin | Shengqiang Tang | Wentao Huang
Volume: 03
Issue: 03
Year: 2012
The Application of Mixed Method in Developing a Cyber Terrorism Framework

Author(s): Rabiah Ahmad | Zahri Yunos
Volume: 03
Issue: 03
Year: 2012
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

Author(s): Archana Tiwari | Manisha Sharma
Volume: 03
Issue: 03
Year: 2012
Hardware Performance Evaluation of SHA-3 Candidate Algorithms

Author(s): Yaser Jararweh | Lo’ai Tawalbeh | Hala Tawalbeh | Abidalrahman Moh’d
Volume: 03
Issue: 02
Year: 2012
Effect of Network Traffic on IPS Performance

Author(s): Shahriar Mohammadi | Vahid Allahvakil | Mojtaba Khaghani
Volume: 03
Issue: 02
Year: 2012
A Visual Cryptography Based Digital Image Copyright Protection

Author(s): Adel Hammad Abusitta
Volume: 03
Issue: 02
Year: 2012
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS

Author(s): Ahmad Bakhtiyari Shahri | Zuraini Ismail
Volume: 03
Issue: 02
Year: 2012
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks

Author(s): Ming Tong | Tao Chen | Wei Zhang | Linna Dong
Volume: 03
Issue: 02
Year: 2012
Determinants in Human Gait Recognition

Author(s): Tahir Amin | Dimitrios Hatzinakos
Volume: 03
Issue: 02
Year: 2012
A Robust Method to Detect Hidden Data from Digital Images

Author(s): Romany F. Mansour | W. F. Awwad | A. A. Mohammed
Volume: 03
Issue: 02
Year: 2012
A Fair Electronic Cash System with Identity-Based Group Signature Scheme

Author(s): Khalid. O. Elaalim | Shoubao Yang
Volume: 03
Issue: 02
Year: 2012
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks

Author(s): Sanjeev Kumar | Raja Sekhar Reddy Gade
Volume: 03
Issue: 02
Year: 2012
Reference Encryption for Access Right Segregation and Domain Representation

Author(s): Lanfranco Lopriore
Volume: 03
Issue: 02
Year: 2012
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Rapperswil
Tango Rapperswil