Journal: IJIPSI

Volume 1, Issue 4

299 -- 311Alex Doyal, Justin Zhan. Triple DoS: DDoS defence and traceback
312 -- 343Syed Taqi Ali, B. B. Amberker. A dynamic constant size attribute-based group signature scheme with attribute anonymity
344 -- 359Andre Abadie, Duminda Wijesekera. An approach for risk assessment and mitigation in cognitive radio technologies
360 -- 380Asif Imran, Alim Ul Gias, Rayhanur Rahman, Kazi Sakib. ProvIntSec: a provenance cognition blueprint ensuring integrity and security for real life open source cloud
381 -- 402Mehdi Sagheb-Tehrani, Arbi Ghazarian. High development cost and software piracy: a study of motives

Volume 1, Issue 2/3

129 -- 159Liqun Chen, Jiangtao Li 0001. VLR group signatures with indisputable exculpability and efficient revocation
160 -- 183Lee Fueng Yap, Takeshi Yashiro, Masahiro Bessho, Tomonori Usaka, M. Fahim Ferdous Khan, Noboru Koshizuka, Ken Sakamura. SUCAS: smart-card-based secure user-centric attestation framework for location-based services
184 -- 204Michael D. Larsen, Jennifer C. Huckett. Multimethod synthetic data generation for confidentiality and measurement of disclosure risk
205 -- 233Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. Minimising disclosure of client information in credential-based interactions
234 -- 252Shi-Cho Cha, Ya-Ping Fu, Ren-Ting Ku, Hao-Ping Lin. On considering enforcement while establishing RFID privacy policies
253 -- 277Somayeh Taheri, Salke Hartung, Dieter Hogrefe. RDIS: destination location privacy in MANETs
278 -- 297Zhibin Zhou, Dijiang Huang. Gradual identity exposure using attribute-based encryption

Volume 1, Issue 1

3 -- 33Ernie Brickell, Jiangtao Li. Enhanced privacy ID from bilinear pairing for hardware authentication and attestation
34 -- 58Lei Jin, Hassan Takabi, James B. D. Joshi. Analysing security and privacy issues of using e-mail address as identity
59 -- 78Amirreza Masoumzadeh, James Joshi. Ontology-based access control for social network systems
79 -- 105Dalal Ahmed Al-Arayed, João Pedro Sousa. A general model for trust management
106 -- 126Nancy R. Mead, Seiya Miyazaki, Justin Zhan. Integrating privacy requirements considerations into a security requirements engineering method and tool