researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJICS
Home
Index
Info
Issue
Volume
13
, Issue
2
141
--
165
Lija Mohan
,
M. Sudheep Elayidom
.
Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big data
166
--
186
Jian-Feng Zhao
,
Shu-Ying Wang
,
Li-Tao Zhang
,
Xian-Feng Li
.
Image encryption scheme based on a novel fractional order compound chaotic attractor
187
--
209
Wisam Elmasry
,
Akhan Akbulut
,
Abdul Halim Zaim
.
Comparative evaluation of different classification techniques for masquerade attack detection
210
--
226
Ahmad Salah Al-Ahmad
,
Syed Ahmad Aljunid
,
Normaly Kamal Ismail
.
Mobile cloud computing applications penetration testing model design
227
--
248
Saeed Ullah Jan
,
Fawad Qayum
.
An authentication scheme for distributed computing environment