Journal: Information Systems Security

Volume 22, Issue 2

55 -- 67Shellie Wedman, Annette Tetmeyer, Hossein Saiedian. An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking Attacks
68 -- 82Vik Pant, William P. Wagner. Hyper-Encryption: Eternal Secrecy Using the Bounded Storage and Limited Access Models
83 -- 97Abdelrahman Desoky. Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm - High Level of Security for Fooling the Enemy
98 -- 103Arun Vijayaragavan, P. Mohan Kumar, K. L. Shunmuganathan. Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory