Journal: J. Internet Serv. Inf. Secur.

Volume 10, Issue 3

1 -- 30Arinjita Paul, Lihua Wang, S. Sharmila Deva Selvi, C. Pandu Rangan. Non-transferability in Proxy Re-Encryption Revisited
31 -- 46Samir Talegaon, Ram Krishnan. Administrative Models for Role Based Access Control in Android
47 -- 75Morteza Alizadeh, Karl Andersson 0001, Olov Schelén. A Survey of Secure Internet of Things in Relation to Blockchain
76 -- 92Gabriele Baldi, Yair Diaz-Tellez, Theo Dimitrakos, Fabio Martinelli, Christina Michailidou, Paolo Mori, Oleksii Osliak, Andrea Saracino. Session-dependent Usage Control for Big Data
93 -- 109Manipriya S., C. Mala, Samson Mathew. A Collaborative Framework for Traffic Information in Vehicular Adhoc Network Applications
110 -- 127Lukas König, Stefan Unger, Peter Kieseberg, Simon Tjoa. The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks

Volume 10, Issue 2

1 -- 15Hwankuk Kim. 5G core network security issues and attack classification from network protocol perspective
16 -- 34Lasse Herskind, Panagiota Katsikouli, Nicola Dragoni. Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble
35 -- 48Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, Jia Yu 0005. Secure Computation Outsourcing for Inversion in Finite Field
49 -- 66Andrey Pavlenko, Nursultan Askarbekuly, Swati Megha, Manuel Mazzara. Micro-frontends: application of microservices to web front-ends
67 -- 81Sherifdeen Lawa, Ram Krishnan. Policy Review in Attribute Based Access Control - A Policy Machine Case Study
82 -- 90Nguyen Canh Thang, Minho Park. Detecting Malicious Middleboxes In Service Function Chaining
91 -- 102Francesco Colace, Massimo De Santo, Marco Lombardi, Rosalba Mosca, Domenico Santaniello. A Multilayer Approach for Recommending Contextual Learning Paths
103 -- 121Yan Zhao, Ning Hu, Chi Zhang, Xinda Cheng. DCG: A Client-side Protection Method for DNS Cache

Volume 10, Issue 1

1 -- 0Ilsun You. Letter from the Editor-in-Chief
2 -- 21Bo-Yeon Sim, Dong-Guk Han. A Study on the SCA Trends for Application to IoT Devices
22 -- 37Fulvio Valenza, Manuel Cheminod. An Optimized Firewall Anomaly Resolution
38 -- 49David John Lemay, Ram B. Basnet, Tenzin Doleck. Examining the Relationship between Threat and Coping Appraisal in Phishing Detection among College Students
50 -- 63Yangzhicheng Lu, Tomoyuki Ishida. Implementation and Evaluation of a High-presence Interior Layout Simulation System using Mixed Reality