Journal: Inf. Sec. Techn. Report

Volume 19, Issue 6

321 -- 330Robert Layton, Paul A. Watters. A methodology for estimating the tangible cost of data breaches
331 -- 340Kamel Mohamed Faraoun. A novel fast and provably secure (t, n)-threshold secret sharing construction for digital images

Volume 19, Issue 4-5

257 -- 271Sotirios Pirounias, Dimitrios Mermigas, Constantinos Patsakis. The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study
272 -- 281S. K. Ghosal, J. K. Mandal. Binomial transform based fragile watermarking for image authentication
282 -- 294Marimuthu Karuppiah, R. Saravanan. A secure remote user mutual authentication scheme using smart cards
295 -- 300Partha Sarathi Roy, Avishek Adhikari. One-sided leakage-resilient privacy only two-message oblivious transfer
301 -- 307Mohamed S. Kheir, Heinz Kreft, Iris Hölken, Reinhard H. Knöchel. On the physical robustness of RF on-chip nanostructured security
308 -- 320Chen Sun, Yang Wang, Jun Zheng. Dissecting pattern unlock: The effect of pattern strength meter on pattern selection

Volume 19, Issue 3

163 -- 164Shujun Li, Konrad Rieck, Alan Woodward. Special issue on threat detection, analysis and defense
165 -- 181Stéphane Paul, Raphaël Vignon-Davillier. Unifying traditional risk assessment approaches with attack trees
182 -- 193Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Daniele Sgandurra. Automating the assessment of ICT risk
194 -- 208Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li. PeerRush: Mining for unwanted P2P traffic
209 -- 223Martin Johns. Script-templates for the Content Security Policy
224 -- 244Jason C. Cohen, Subrata Acharya. Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection
245 -- 255Saman Salehi, M. A. Balafar. Visual multi secret sharing by cylindrical random grid

Volume 19, Issue 2

103 -- 104Steve Schneider, Vanessa Teague, Chris Culnane, James Heather. Special Section on Vote-ID 2013
105 -- 114Jurlind Budurushi, Roman Jöris, Melanie Volkamer. Implementing and evaluating a software-independent voting system for polling station elections
115 -- 129Bernhard Beckert, Rajeev Goré, Carsten Schürmann, Thorsten Bormer, Jian Wang. Verifying voting schemes
130 -- 142Rui Joaquim. How to prove the validity of a complex ballot encryption to the voter and the public
143 -- 148Mohamed S. Kheir, Heinz Kreft, Reinhard H. Knöchel. A novel RF fingerprinting approach for hardware integrated security
149 -- 162Seyed Morteza Hosseini, Hossein Karimi, Majid Vafaei Jahan. Generating pseudo-random numbers by combining two systems with complex behaviors

Volume 19, Issue 1

1 -- 0Adrian Waller, Gregorio Martínez Pérez, Félix Gómez Mármol. Editorial: Special issue on Identity Protection and Management
2 -- 17Georgios Kambourakis. Anonymity and closely related terms in the cyberspace: An analysis by example
18 -- 24Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng. An efficient and secure anonymous mobility network authentication scheme
25 -- 44Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss. Concepts and languages for privacy-preserving attribute-based authentication
45 -- 60Younis A. Younis, Kashif Kifayat, Madjid Merabti. An access control model for cloud computing
61 -- 77Sanna Suoranta, Kamran Manzoor, Asko Tontti, Joonas Ruuskanen, Tuomas Aura. Logout in single sign-on systems: Problems and solutions
78 -- 87Xiaole Fang, Qianxue Wang, Christophe Guyeux, Jacques M. Bahi. FPGA acceleration of a pseudorandom number generator based on chaotic iterations
88 -- 100Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini. On the privacy of private browsing - A forensic approach