Journal: IJISP

Volume 6, Issue 4

1 -- 39Pejman Niksaz, Mohammad Javad Kargar. A Full Review of Attacks and Countermeasures in Wireless Sensor Networks
40 -- 54Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang. A Survey of U.S. Laws for Health Information Security & Privacy
55 -- 70Sunil Kumar Muttoo, Vinay Kumar, Abhishek Bansal. Secure Data Hiding Using Eight Queens Solutions
71 -- 93Ming Yang, Chih-Cheng Hung, Edward Jung. Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization
94 -- 116Marco Spruit, Wouter de Bruijn. CITS: The Cost of IT Security Framework

Volume 6, Issue 3

1 -- 37Allan Rwabutaza, Ming Yang, Nikolaos G. Bourbakis. A Comparative Survey on Cryptology-Based Methodologies
38 -- 55Zakarya Alzamil. Information Security Awareness at Saudi Arabians' Organizations: An Information Technology Employee's Perspective
56 -- 74Azam Zavvari, Ahmed Patel. Critical Evaluation of RFID Security Protocols
75 -- 87Amanda Eisenga, Travis L. Jones, Walter Rodriguez. Investing in IT Security: How to Determine the Maximum Threshold
88 -- 110Debajyoti Konar, Chandan Mazumdar. A Practical Approach of Fairness in E-Procurement

Volume 6, Issue 2

1 -- 15Ahmed Patel, Mona Taghavi, Joaquim Celestino JĂșnior, Rodziah Latih, Abdullah Mohd Zin. Safety Measures for Social Computing in Wiki Learning Environment
16 -- 33Dongjin Kim, Zhiyuan Chen, Aryya Gangopadhyay. Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
34 -- 52Roli Bansal, Priti Sehgal, Punam Bedi. Securing Fingerprint Images Through PSO Based Robust Facial Watermarking
53 -- 63U. S. Rawat, Shishir Kumar. ECFS: An Enterprise-Class Cryptographic File System for Linux
64 -- 94Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata. Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption

Volume 6, Issue 1

1 -- 13S. Srinivasan, Robert Barker. Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce
14 -- 32Thijs Baars, Marco Spruit. Designing a Secure Cloud Architecture: The SeCA Model
33 -- 56Pei Yuan Shen, Maolin Tang, Vicky Liu, William J. Caelli. Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs
57 -- 76Z. Cliffe Schreuders, Tanya McGill, Christian Payne. Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM