Journal: IJICS

Volume 13, Issue 2

141 -- 165Lija Mohan, M. Sudheep Elayidom. Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big data
166 -- 186Jian-Feng Zhao, Shu-Ying Wang, Li-Tao Zhang, Xian-Feng Li. Image encryption scheme based on a novel fractional order compound chaotic attractor
187 -- 209Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim. Comparative evaluation of different classification techniques for masquerade attack detection
210 -- 226Ahmad Salah Al-Ahmad, Syed Ahmad Aljunid, Normaly Kamal Ismail. Mobile cloud computing applications penetration testing model design
227 -- 248Saeed Ullah Jan, Fawad Qayum. An authentication scheme for distributed computing environment