Journal: IJISP

Volume 5, Issue 2

1 -- 12Douglas M. Kline, Ling He, Ulku Yaylacicegi. User Perceptions of Security Technologies
13 -- 32Md. Golam Kaosar, Xun Yi. Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree
33 -- 53Anirban Sengupta, Chandan Mazumdar. A Mark-Up Language for the Specification of Information Security Governance Requirements
54 -- 60Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao. On the Security of Self-Certified Public Keys