Journal: IJICS

Volume 14, Issue 3/4

211 -- 228Unnikrishnan K, Pramod K. V. Prediction-based robust blind reversible watermarking for relational databases
229 -- 241Nanyuan Cao, Zhenfu Cao, Xiaolei Dong, Haijiang Wang. Improved RSA lossy trapdoor function and applications
242 -- 262Zhijie Fan, Chengxiang Tan, Xin Li. A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps
263 -- 280Umer Waqas, Shazia Afzal, Mubeen Akhtar Mir, Muhammad Yousaf. Cryptographic strength evaluation of AES s-box variants
281 -- 299Amardeep Singh, Monika Singh, Divya Bansal, Sanjeev Sofat. Optimised K-anonymisation technique to deal with mutual friends and degree attacks
300 -- 317Jayashree D. Gavade, S. R. Chougule, Vishwaja Rathod. A robust passive blind copy-move image forgery detection
318 -- 326Mamata Rath, Binod Kumar Pattanayak. Performance evaluation of optimised protocol in MANET
327 -- 343Fadi Abu-Amara, Ameur Bensefia. A handwriting document encryption scheme based on segmentation and chaotic logarithmic map
344 -- 353Maitreyi Ponguwala, Meda Sreenivasa Rao. Secured spray and focus protocol design in intermittently connected mobile networks
354 -- 379Iqra Saraf, Avinash K. Shrivastava, Javaid Iqbal. Effort-based fault detection and correction modelling for multi release of software
380 -- 402Ajeet Singh, Appala Naidu Tentu, V. Ch. Venkaiah. A dynamic key management paradigm for secure wireless ad hoc network communications
403 -- 439Sunil K. Moon, Rajshree D. Raut. Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility