researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJICS
Home
Index
Info
Volume
Volume
6
, Issue
4
311
--
321
Yong Ho Kang
,
Kimoon Keum
,
Changbok Jang
,
Joo Man Kim
.
Study of mobile virtualisation-based security technology for smartwork environment
322
--
332
Man Ki Kim
,
You-Sik Hong
.
Development AI traffic-safety system using RFID technique and USN theory
333
--
343
Hyunjun Choi
.
Image encryption method for depth + texture video contents
344
--
353
Kyujin Lee
.
An iterative layered interference canceller scheme for OFDM in wireless mesh security networks
354
--
371
Limin Shen
,
Futai Zhang
,
Yinxia Sun
,
Sujuan Li
.
Cryptanalysis and improvement on a certificateless encryption scheme in the standard model
372
--
382
Prakash Kuppuswamy
,
Saeed Q. Y. Al-Khalidi
.
Hybrid encryption/decryption technique using new public key and symmetric key algorithm
383
--
407
Andrew Mangle
,
Sandip C. Patel
.
Issues in user authentication using security questions
Volume
6
, Issue
3
199
--
240
P. Vinod
,
Vijay Laxmi
,
Manoj Singh Gaur
,
Grijesh Chauhan
.
Detecting malicious files using non-signature-based methods
241
--
269
Mohamed Amine Ferrag
,
Mehdi Nafa
,
Salim Ghanemi
.
SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network
270
--
285
Hassan Rasheed
.
Vulnerability distribution scoring for software product security assessment
286
--
305
Muthulakshmi Angamuthu
,
Anitha Ramalingam
.
Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem
Volume
6
, Issue
2
109
--
132
Syed Taqi Ali
,
B. B. Amberker
.
Attribute-based group signature without random oracles with attribute anonymity
133
--
142
Anant M. Bagade
,
Sanjay N. Talbar
.
Secure transmission of morphed stego keys over internet using IP steganography
143
--
178
Oluwasefunmi 'Tale Arogundade
,
Zhi Jin
,
Xiaoguang Yang
.
Towards ontological approach to eliciting risk-based security requirements
179
--
197
Ismahani Ismail
,
Muhammad Nadzir Marsono
,
Sulaiman Mohd Nor
.
Malware detection using augmented naive Bayes with domain knowledge and under presence of class noise
Volume
6
, Issue
1
1
--
11
R. Sakthivel
,
M. Vanitha
,
Harish M. Kittur
.
Low power high throughput reconfigurable stream cipher hardware VLSI architectures
12
--
50
Suvrojit Das
,
Debayan Chatterjee
,
Debidas Ghosh
,
Narayan C. Debnath
.
Extracting the system call identifier from within VFS: a kernel stack parsing-based approach
51
--
62
P. M. Siva Raja
,
E. Baburaj
.
Genetic algorithms based data hiding scheme for digital images with LSBMR
63
--
92
Ahmed AlEroud
,
George Karabatis
,
Prayank Sharma
,
Peng He
.
Context and semantics for detection of cyber attacks
93
--
107
Achilleas Tsitroulis
,
Dimitris Lampoudis
,
Emmanuel Tsekleves
.
Exposing WPA2 security protocol vulnerabilities