researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
19
, Issue
6
299
--
309
Klaus Julisch
,
Michael Hall
.
Security and Control in the Cloud
320
--
327
Fernando Roda
,
Luis Lara
.
Chaotic Cipher Using the Duffing Equation
328
--
335
Vinay Kumar
,
S. K. Muttoo
.
Graph Theoretic Approach to Steganography to Secure Message Digest
Volume
19
, Issue
5
237
--
242
Jin Peng
,
Xin Zhao
.
SSH-Based Device Identity and Trust Initialization
243
--
252
Lo ai Ali Tawalbeh
,
Saadeh Sweidan
.
Hardware Design and Implementation of ::::ElGamal:::: Public-Key Cryptography Algorithm
263
--
272
S. A. Arunmozhi
,
Y. Venkataramani
.
A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks
273
--
281
Jyotsna Singh
,
Parul Garg
,
Alok Nath De
.
Data Hiding in Audio Using Random Orthogonal Matrices
282
--
293
John Mark Chasser
.
Security Concerns in IPv6 and Transition Networks
Volume
19
, Issue
4
175
--
181
Durgesh Kumar Mishra
,
Manohar Chandwani
.
A Secured MultiParty Computational Protocol to Protect Cyber Space
182
--
190
Seung S. Yang
,
Hongsik Choi
,
Hankyu Joo
.
Vulnerability Analysis of the Grid Data Security Authentication System
191
--
203
Ankur Gupta
,
Lalit K. Awasthi
.
A Containment-Based Security Model for Cycle-Stealing P2P Applications
204
--
212
Siva S. Sivatha Sindhu
,
A. Kannan
.
Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm
213
--
225
V. Vijayaraghavan
,
Sanjoy Paul
,
Rajarathnam Nallusamy
.
iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts
Volume
19
, Issue
3
109
--
117
Greg Gogolin
,
James Jones
.
Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business
124
--
131
Gavin Wylie Manes
,
Elizabeth Downing
.
What Security Professionals Need to Know About Digital Evidence
142
--
152
Anand Gupta
,
Shyam K. Gupta
,
Isha Manu Ganesh
,
Pankhuri Gupta
,
Vikram Goyal
,
Sangeeta Sabharwal
.
Opaqueness Characteristic of a Context Honeypot System
160
--
174
Xi Li
.
How to Take Advantage of Distrusted Parties or Secure Auxiliary Computations for Every Language in NP
Volume
19
, Issue
2
51
--
52
Ralph Spencer Poore
.
Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist
53
--
60
Nicolas Sklavos
.
On the Hardware Implementation Cost of Crypto-Processors Architectures
61
--
73
Ju An Wang
,
Michael M. Guo
,
Jairo Camargo
.
An Ontological Approach to Computer System Security
74
--
83
Apostolos P. Fournaris
.
Trust Ensuring Crisis Management Hardware Module
84
--
94
S. V. Sathyanarayana
,
M. Aswatha Kumar
,
K. N. Hari Bhat
.
Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite Field ::::GF::::(2:::::::m:::::::) and Their Properties
95
--
99
Aaron D. Sanders
.
Conficker: Lessons in Secure Software and System Design
Volume
19
, Issue
1
4
--
10
Avinash W. Kadam
.
Personal Business Continuity Planning
11
--
21
D. S. Adane
,
S. R. Sathe
.
A Security Model for Securing Data in Multiagent Applications
22
--
35
Rachid Beghdad
.
Critical Study of Supervised Learning Techniques in Predicting Attacks