Journal: Information Systems Security

Volume 28, Issue 1-2

1 -- 19Shivi Garg, R. K. Singh, A. K. Mohapatra. Analysis of software vulnerability classification based on different technical parameters
20 -- 34Lanfranco Lopriore. Key management in wireless sensor networks
35 -- 45Milap J. Bhuva, Sanjay Singh. Symmetric key-based authenticated encryption protocol
46 -- 54Mikhail Styugin. Protection from reconnaissance for establishing information security systems