Journal: Inf. Sec. Techn. Report

Volume 18, Issue 4

157 -- 166Sagar Gujjunoori, B. B. Amberker. DCT based reversible data embedding for MPEG-4 video using HVS characteristics
167 -- 179V. Santhi, P. Arulmozhivarman. Hadamard transform based adaptive visible/invisible watermarking scheme for digital images
180 -- 192Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar. Secret image sharing using grayscale payload decomposition and irreversible image steganography
193 -- 205Muhamed Turkanovic, Gregor Polancic. On the security of certain e-communication types: Risks, user awareness and recommendations
206 -- 214Thi Hanh Nguyen, Yi Wang, Renfa Li. An improved ridge features extraction algorithm for distorted fingerprints matching
215 -- 218Cheng-Chi Lee, Yan-Ming Lai, Chin-Sung Hsiao. Cryptanalysis of a simple key assignment for access control based on polynomial

Volume 18, Issue 2-3

97 -- 0L. M. Cheng, K. W. Wong. Editorial: Smart Card and RFID Security
98 -- 107Sheetal Kalra, Sandeep K. Sood. Advanced remote user authentication protocol for multi-server architecture based on ECC
108 -- 129Olga Gadyatskaya, Fabio Massacci, Quang Huy Nguyen 0002, Boutheina Chetali. Load time code validation for mobile phone Java Cards
130 -- 137Samiya Hamadouche, Jean-Louis Lanet. Virus in a smart card: Myth or reality?
138 -- 147Armin Krieg, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Andreas Genser, Josef Haid. Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors
148 -- 156Nassima Kamel, Jean-Louis Lanet. Risks induced by Web applications on smart cards

Volume 18, Issue 1

1 -- 0Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani, Radu State, Joaquín García-Alfaro, Nadia Tawbi. Editorial
2 -- 13Nizar Kheir. Behavioral classification and detection of malware through HTTP user agent anomalies
14 -- 29William M. Fitzgerald, Ultan Neville, Simon N. Foley. MASON: Mobile autonomic security for network access controls
30 -- 44Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben-Ghorbel-Talbi, Stephane Morucci, Nada Essaouni. Smatch: Formal dynamic session management model for RBAC
45 -- 52Palaniappan Shamala, Rabiah Ahmad, Mariana Yusoff. A conceptual framework of info structure for information security risk assessment (ISRA)
53 -- 67Sherif Saad, Issa Traoré. Semantic aware attack scenarios reconstruction
68 -- 82Tahsin Arafat Reza, Michel Barbeau. QaASs: QoS aware adaptive security scheme for video streaming in MANETs
83 -- 95Hadi Ahmadi, Reihaneh Safavi-Naini. Message transmission and key establishment: General equality for weak and strong capacities