Journal: Information Systems Security

Volume 19, Issue 6

299 -- 309Klaus Julisch, Michael Hall. Security and Control in the Cloud
320 -- 327Fernando Roda, Luis Lara. Chaotic Cipher Using the Duffing Equation
328 -- 335Vinay Kumar, S. K. Muttoo. Graph Theoretic Approach to Steganography to Secure Message Digest

Volume 19, Issue 5

237 -- 242Jin Peng, Xin Zhao. SSH-Based Device Identity and Trust Initialization
243 -- 252Lo ai Ali Tawalbeh, Saadeh Sweidan. Hardware Design and Implementation of ::::ElGamal:::: Public-Key Cryptography Algorithm
263 -- 272S. A. Arunmozhi, Y. Venkataramani. A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks
273 -- 281Jyotsna Singh, Parul Garg, Alok Nath De. Data Hiding in Audio Using Random Orthogonal Matrices
282 -- 293John Mark Chasser. Security Concerns in IPv6 and Transition Networks

Volume 19, Issue 4

175 -- 181Durgesh Kumar Mishra, Manohar Chandwani. A Secured MultiParty Computational Protocol to Protect Cyber Space
182 -- 190Seung S. Yang, Hongsik Choi, Hankyu Joo. Vulnerability Analysis of the Grid Data Security Authentication System
191 -- 203Ankur Gupta, Lalit K. Awasthi. A Containment-Based Security Model for Cycle-Stealing P2P Applications
204 -- 212Siva S. Sivatha Sindhu, A. Kannan. Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm
213 -- 225V. Vijayaraghavan, Sanjoy Paul, Rajarathnam Nallusamy. iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts

Volume 19, Issue 3

109 -- 117Greg Gogolin, James Jones. Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business
124 -- 131Gavin Wylie Manes, Elizabeth Downing. What Security Professionals Need to Know About Digital Evidence
142 -- 152Anand Gupta, Shyam K. Gupta, Isha Manu Ganesh, Pankhuri Gupta, Vikram Goyal, Sangeeta Sabharwal. Opaqueness Characteristic of a Context Honeypot System
160 -- 174Xi Li. How to Take Advantage of Distrusted Parties or Secure Auxiliary Computations for Every Language in NP

Volume 19, Issue 2

51 -- 52Ralph Spencer Poore. Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist
53 -- 60Nicolas Sklavos. On the Hardware Implementation Cost of Crypto-Processors Architectures
61 -- 73Ju An Wang, Michael M. Guo, Jairo Camargo. An Ontological Approach to Computer System Security
74 -- 83Apostolos P. Fournaris. Trust Ensuring Crisis Management Hardware Module
84 -- 94S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat. Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite Field ::::GF::::(2:::::::m:::::::) and Their Properties
95 -- 99Aaron D. Sanders. Conficker: Lessons in Secure Software and System Design

Volume 19, Issue 1

4 -- 10Avinash W. Kadam. Personal Business Continuity Planning
11 -- 21D. S. Adane, S. R. Sathe. A Security Model for Securing Data in Multiagent Applications
22 -- 35Rachid Beghdad. Critical Study of Supervised Learning Techniques in Predicting Attacks