Journal: IJICS

Volume 14, Issue 3/4

211 -- 228Unnikrishnan K, Pramod K. V. Prediction-based robust blind reversible watermarking for relational databases
229 -- 241Nanyuan Cao, Zhenfu Cao, Xiaolei Dong, Haijiang Wang. Improved RSA lossy trapdoor function and applications
242 -- 262Zhijie Fan, Chengxiang Tan, Xin Li. A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps
263 -- 280Umer Waqas, Shazia Afzal, Mubeen Akhtar Mir, Muhammad Yousaf. Cryptographic strength evaluation of AES s-box variants
281 -- 299Amardeep Singh, Monika Singh, Divya Bansal, Sanjeev Sofat. Optimised K-anonymisation technique to deal with mutual friends and degree attacks
300 -- 317Jayashree D. Gavade, S. R. Chougule, Vishwaja Rathod. A robust passive blind copy-move image forgery detection
318 -- 326Mamata Rath, Binod Kumar Pattanayak. Performance evaluation of optimised protocol in MANET
327 -- 343Fadi Abu-Amara, Ameur Bensefia. A handwriting document encryption scheme based on segmentation and chaotic logarithmic map
344 -- 353Maitreyi Ponguwala, Meda Sreenivasa Rao. Secured spray and focus protocol design in intermittently connected mobile networks
354 -- 379Iqra Saraf, Avinash K. Shrivastava, Javaid Iqbal. Effort-based fault detection and correction modelling for multi release of software
380 -- 402Ajeet Singh, Appala Naidu Tentu, V. Ch. Venkaiah. A dynamic key management paradigm for secure wireless ad hoc network communications
403 -- 439Sunil K. Moon, Rajshree D. Raut. Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility

Volume 14, Issue 2

102 -- 117Majid Mumtaz, Ping Luo 0004. An improved cryptanalysis of large RSA decryption exponent with constrained secret key
118 -- 135K. V. Raghavender, P. Premchand. Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model
136 -- 145Sreenivasa Rao Annaluri, Venkata Ramana Attili, Kalli Srinivasa Nageswara Prasad. Secure and unifold mining model for pattern discovery from streaming data
146 -- 159Kuppani Sathish, Kamakshaiah Kolli. Sustainable wireless clouds with security assurance
160 -- 170V. Partha Saradi, P. Kailasapathi. A novel binary encryption algorithm for navigation control of robotic vehicles through visible light communication
171 -- 191Vlera Alimehaj, Arbnor Halili, Ramadan Dervishi, Vehbi Neziri, Blerim Rexha. Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology
192 -- 209Ayoub Amrani, Najat Rafalia, Jaafar Abouchabaka. Mobile agent security using Amrani et al.'s protocol and binary serialisation

Volume 14, Issue 1

3 -- 19A. Shailaja, Krishnamurthy Gorappa Ningappa. A low area VLSI implementation of extended tiny encryption algorithm using Lorenz chaotic system
20 -- 39B. J. Ambika, M. K. Banga. A novel energy efficient routing algorithm for MPLS-MANET using fuzzy logic controller
40 -- 59S. Bhargavi Latha, D. Venkata Reddy, A. Damodaram. Video watermarking using neural networks
60 -- 78G. L. Anil, J. L. Mazher Iqbal. Secure energy efficient network priority routing protocol for effective data collection and key management in dynamic WSNs
79 -- 97Yenumaladoddi Jayasimha, R. Venkata Siva Reddy. A facial expression recognition model using hybrid feature selection and support vector machines