Journal: Information Systems Security

Volume 33, Issue 2

97 -- 120Payal Sharma, B. R. Purushothama. A lightweight group key management scheme with constant rekeying cost and public bulletin size
121 -- 137Joakim Kävrestad, Steven Furnell, Marcus Nohlberg. User perception of Context-Based Micro-Training - a method for cybersecurity training
138 -- 157Thierry Mefenza, Damien Vergnaud. Lattice attacks on pairing-based signatures
158 -- 171Salifu Yusif, Abdul Hafeez-Baig, Charles Anachanser. Internet governance and cyber-security: a systematic literature review
172 -- 191Divya V. L., Job P. A., K. Preetha Mathew. Secure query processing and optimization in cloud environment: a review

Volume 33, Issue 1

1 -- 15Rajesh Bingu, S. Jothilakshmi 0001, N. Srinivasu. Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment
42 -- 53Farid Javani, Alan T. Sherman. BVOT: self-tallying boardroom voting with oblivious transfer
54 -- 72Nelson Russo, Leonilde Reis, Maria Clara Silveira, Henrique S. Mamede. Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review
73 -- 95Savitha M. M, Basarkod P. I. Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms