


default search action
Journal of Information Security and Applications, Volume 18
Volume 18, Number 1, July 2013
- Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani

, Radu State, Joaquín García-Alfaro
, Nadia Tawbi
:
Editorial. 1 - Nizar Kheir:

Behavioral classification and detection of malware through HTTP user agent anomalies. 2-13 - William M. Fitzgerald, Ultan Neville, Simon N. Foley

:
MASON: Mobile autonomic security for network access controls. 14-29 - Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben-Ghorbel-Talbi, Stephane Morucci, Nada Essaouini:

Smatch: Formal dynamic session management model for RBAC. 30-44 - Palaniappan Shamala

, Rabiah Ahmad, Mariana Yusoff:
A conceptual framework of info structure for information security risk assessment (ISRA). 45-52 - Sherif Saad, Issa Traoré:

Semantic aware attack scenarios reconstruction. 53-67 - Tahsin Arafat Reza

, Michel Barbeau
:
QaASs: QoS aware adaptive security scheme for video streaming in MANETs. 68-82 - Hadi Ahmadi, Reihaneh Safavi-Naini:

Message transmission and key establishment: General equality for weak and strong capacities. 83-95
Volume 18, Numbers 2-3, September 2013
- Lee-Ming Cheng

, K. W. Wong:
Editorial: Smart Card and RFID Security. 97 - Sheetal Kalra

, Sandeep K. Sood
:
Advanced remote user authentication protocol for multi-server architecture based on ECC. 98-107 - Olga Gadyatskaya, Fabio Massacci

, Quang Huy Nguyen, Boutheina Chetali:
Load time code validation for mobile phone Java Cards. 108-129 - Samiya Hamadouche, Jean-Louis Lanet:

Virus in a smart card: Myth or reality? 130-137 - Armin Krieg

, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Andreas Genser, Josef Haid:
Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors. 138-147 - Nassima Kamel, Jean-Louis Lanet:

Risks induced by Web applications on smart cards. 148-156
Volume 18, Number 4, December 2013
- Sagar Gujjunoori

, B. B. Amberker:
DCT based reversible data embedding for MPEG-4 video using HVS characteristics. 157-166 - V. Santhi

, Pachiyappan Arulmozhivarman
:
Hadamard transform based adaptive visible/invisible watermarking scheme for digital images. 167-179 - Soumendu Chakraborty, Anand Singh Jalal

, Charul Bhatnagar:
Secret image sharing using grayscale payload decomposition and irreversible image steganography. 180-192 - Muhamed Turkanovic, Gregor Polancic:

On the security of certain e-communication types: Risks, user awareness and recommendations. 193-205 - Thi Hanh Nguyen

, Yi Wang
, Renfa Li:
An improved ridge features extraction algorithm for distorted fingerprints matching. 206-214 - Cheng-Chi Lee

, Yan-Ming Lai, Chin-Sung Hsiao:
Cryptanalysis of a simple key assignment for access control based on polynomial. 215-218

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














