Journal: IJICS

Volume 7, Issue 1

1 -- 13Kevin Curran, Vivian Maynes, Declan Harkin. Mobile device security
14 -- 38Haixia Xu, Bao Li, Qixiang Mei. Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes
39 -- 48Lei Niu, Changqing Zhang, Qi Xia, Yong Yu. Advanced security analysis of a signature scheme with message recovery
49 -- 63Narayanan Prasanth, Kannan Balasubramanian. Performance analysis of buffered crossbar switch scheduling algorithms
64 -- 90Olayemi M. Olaniyi, Oladiran T. Arulogun, Oluwasayo E. Omidiora, Oladotun O. Okediran. Implementing generic security requirements in e-voting using modified stegano-cryptographic approach