Journal: Information Systems Security

Volume 22, Issue 5-6

205 -- 207Giorgio Di Natale. TRUDEVICE: A COST Action on Trustworthy Manufacturing and Utilization of Secure Devices
208 -- 215Ariel Burg, Osnat Keren. On the Efficiency of Berger Codes Against Error Injection Attacks on Parallel Asynchronous Communication Channels
216 -- 225Igor Shumsky, Osnat Keren. Enhancement of Hardware Security by Hamming-Ball Based State Assignment
226 -- 236Sophie Dupuis, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis
237 -- 243Diego Alberto, Paolo Maistri, Régis Leveugle. Forecasting the Effects of Electromagnetic Fault Injections on Embedded Cryptosystems
244 -- 250Mikhail Platonov, Josef Hlavác, Róbert Lórencz. Using Power-Up SRAM State of Atmel ATmega1284P Microcontrollers as Physical Unclonable Function for Key Generation and Chip Identification
251 -- 264Feng Lu, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. Multilevel Ionizing-Induced Transient Fault Simulator
265 -- 273Linus Feiten, Andreas Spilla, Matthias Sauer, Tobias Schubert, Bernd Becker. Implementation and Analysis of Ring Oscillator PUFs on 60 nm Altera Cyclone FPGAs

Volume 22, Issue 4

151 -- 158Stilianos Vidalis, Olga Angelopoulou. Deception and Maneuver Warfare Utilizing Cloud Resources
159 -- 170Osama Hayatle, Hadi Otrok, Amr Youssef. A Markov Decision Process Model for High Interaction Honeypots
171 -- 179Eyong B. Kim. Information Security Awareness Status of Business College: Undergraduate Students
180 -- 186Eben I. Kaplan. Tackling the Password Problem: Image- and Gesture-Based Alternatives to Alphanumeric Passwords
187 -- 200Michael Workman, Daniel C. Phelps, Robert C. Hare. A Study of Performative Hactivist Subcultures and Threats to Businesses
201 -- 202Larry Marks. Inside Cyber Warfare, Mapping the Cyber Underworld, by Carr, Jeffrey 2nd ed, Newton, MA: O'Reilly Media, 2012, 318p., $39.99. ISBN 978-1-449-31004-2
203 -- 0Nicolas Sklavos. C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.CreateSpace Independent Publishing Platform, 2013, 102p., $36.99. ISBN 1480237418

Volume 22, Issue 3

105 -- 116Rajesh Kumar Tiwari, Gadadhar Sahoo. A Novel Watermarking Scheme for Secure Relational Databases
117 -- 125Shilpa Kaman, K. Swetha, Syed Akram, G. Varaprasad. Remote User Authentication Using a Voice Authentication System
126 -- 139Apostolos P. Fournaris. A Distributed Approach of a Threshold Certificate-Based Encryption Scheme with No Trusted Entities
140 -- 149Shabana Kazi, Mark Stamp. Hidden Markov Models for Software Piracy Detection

Volume 22, Issue 2

55 -- 67Shellie Wedman, Annette Tetmeyer, Hossein Saiedian. An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking Attacks
68 -- 82Vik Pant, William P. Wagner. Hyper-Encryption: Eternal Secrecy Using the Bounded Storage and Limited Access Models
83 -- 97Abdelrahman Desoky. Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm - High Level of Security for Fooling the Enemy
98 -- 103Arun Vijayaragavan, P. Mohan Kumar, K. L. Shunmuganathan. Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory

Volume 22, Issue 1

1 -- 9Kaleem Usmani, Amar Kumar Mohapatra, Nupur Prakash. An Improved Framework for Incident Handling
10 -- 20Abhishek Basu, Subir Kumar Sarkar. On the Implementation of Robust Copyright Protection Scheme Using Visual Attention Model
21 -- 34Manjot Bhatia, Sunil Kumar Muttoo, M. P. S. Bhatia. Secure Group Communication with Hidden Group Key
35 -- 45Udai Pratap Rao, Dhiren R. Patel. Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions
46 -- 54Lunzhi Deng, Chenglian Liu, Xiangbin Wang. An Improved Identity-Based Ring Signcryption Scheme