Journal: IJICS

Volume 16, Issue 3/4

207 -- 225Syed Amma Sheik, M. Amutha Prabakar. An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card
226 -- 238Rahul Saha, Gulshan Kumar, Mritunjay Kumar Rai, Hye-Jin Kim 0003. Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks
239 -- 254Saravanan Paramasivam, Shanthi Rekha Shanmugham. Time-shared AES-128 implementation with extremely low-cost for smart card applications
255 -- 271Xiaoqian Liu, Qianmu Li, Tao Li, Ming Wu. Privacy preserving techniques for decision trees
272 -- 291Geeta Sharma, Sheetal Kalra. A robust multi-factor remote user authentication scheme for cloud-IoT services
292 -- 306Fatemeh Rezaeibagha, Yi Mu 0001, Ke Huang, Leyou Zhang. Enhanced bitcoin with two-factor authentication
307 -- 323Sreeja Cherillath Sukumaran, Mohammed Misbahuddin. Secure key exchange scheme: a DNA computing-based approach to resist MITM in DHKE
324 -- 354Gaurav Pareek, B. R. Purushothama. Blockchain-based decentralised access control scheme for dynamic hierarchies
355 -- 374Zyad Elkhadir, Mohammed Benattou. p-LDA approach for intrusion detection system
375 -- 384Zhengjun Cao, Xiqi Wang, Lihua Liu. One privacy-preserving multi-keyword ranked search scheme revisited
385 -- 398Suliman A. Alsuhibany, Fatimah N. Almohaimeed, Naseem A. Alrobah. Synthetic Arabic handwritten CAPTCHA
399 -- 419Chien-Ming Wang, Chih-Hung Wang. A highly secure three-party authentication key exchange protocol and its application in e-business communication with ECK model