Journal: IJIPSI

Volume 4, Issue 4

237 -- 260Wesam Almobaideen, Hebatullah Jarboua, Khair Eddin Sabri. Searchable encryption architectures: survey of the literature and proposing a unified architecture
261 -- 275Dirk Pawlaszczyk, Jannik Weber, Ralf Zimmermann, Christian Hummert. Android apps and advertising networks - a survey on data privacy
276 -- 295Sarandis Mitropoulos, Antonios Gouglidis, Vasileios Giotsas. A categorisation of policy conflicts in distributed systems and network management
296 -- 313Lucien Ngalamou, Harmony L. Schmidbauer. Combating and perpetuating bias: the relationship between bias and computer science
314 -- 333Ronald B. Larson. Privacy concerns and actions to reduce privacy risks

Volume 4, Issue 3

153 -- 169Leila Benarous, Benamar Kadri. Hybrid pseudonym change strategy for location privacy in VANET: protecting location privacy in VANET
170 -- 202Subrata Bose. Commutative encryption: an answer to privacy protected query processing of multi data sources
203 -- 225Jyoti Lamba, V. Ch. Venkaiah. Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme
226 -- 236Chia-Sung Yen. The influence of product placement on TV news and journalists self-evaluation of professionalism and private policy

Volume 4, Issue 2

79 -- 93Rachid Rimani, Naima Hadj-Said, Adda Ali-Pacha. Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key
94 -- 101Chonlathip Aswakan. Live event creation and management: case of King Bhumibol Adulyadej mourning event
102 -- 114Jirayut Monjagapate, Nakorn Rungkittanasan. The study of acceptance Thai LGBTQs in Bangkok: analysis of attitudes from Gen-Z people
115 -- 133Albert Kofi Kwansah Ansah, Daniel Adu-Gyamfi, Stephen Anokye. BiSign: pairing-based anonymity in bitcoin cryptocurrency
134 -- 152Michael Mireku Kwakye. Privacy-preservation in data pre-processing for web usage mining

Volume 4, Issue 1

1 -- 29Vikas Tiwari, Ajeet Singh, Appala Naidu Tentu. Differential cryptanalysis on DES cryptosystem up to eight rounds
30 -- 48Hanane Saidi, Driss Gretete, Adnane Addaim. Survey: secure opportunistic routing protocols in wireless networks
49 -- 64El Arbi Abdellaoui Alaoui, Mustapha El Moudden. Security analysis for intelligent urban freight transport
65 -- 78Asmaa Berdigh, Kenza Oufaska, Khalid El Yassini. 2 emission overview: solutions, challenges and opportunities