Journal: J. Internet Serv. Inf. Secur.

Volume 2, Issue 3/4

1 -- 2Kangbin Yim, Yoshiaki Hori. Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2)
3 -- 17Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame. Securing the "Bring Your Own Device" Policy
18 -- 28Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai. Detecting Information Leakage via a HTTP Request Based on the Edit Distance
29 -- 42Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong Je Cho, Jongmoo Choi. An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks
43 -- 53Ho Seok Kang, Sung-Ryul Kim. Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
54 -- 64Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, PanKoo Kim. A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments
65 -- 76Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang Uk Shin. A Study on Design and Implementation of E-Discovery Service based on Cloud Computing
77 -- 92S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan. Efficient Certificateless Online/Offline Signature
93 -- 109Jeong-Soo Park 0002, KiSeok Bae, YongJe Choi, Dooho Choi, JaeCheol Ha. A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output
110 -- 117Zhiwei Wang, Guozi Sun, Danwei Chen. Short signature from factoring assumption in the standard model
118 -- 128Kunwar Singh, C. Pandurangan, A. K. Banerjee. Lattice Forward-Secure Identity Based Encryption Scheme
129 -- 133Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela. Strategic Information Splitting Using Biometric Patterns
134 -- 147Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim. A Brief Survey on Rootkit Techniques in Malicious Codes
148 -- 153Marek R. Ogiela, Lidia Ogiela. Personal Identification Based on Cognitive Analysis of Selected Medical Visualization

Volume 2, Issue 1/2

1 -- 21Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez. Towards secure mobile P2P applications using JXME
22 -- 48Karl Andersson. Interworking Techniques and Architectures for Heterogeneous Wireless Networks
49 -- 58Jianfeng Wang, Xiaofeng Chen 0001, Hua Ma, Qiang Tang 0001, Jin Li 0002, Hui Zhu. A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data
59 -- 72Charles J. Zinsmeyer, Turgay Korkmaz. A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques
73 -- 92Manuel Mazzara, Nicola Dragoni, Mu Zhou. Implementing Workflow Reconfiguration in WS-BPEL
93 -- 104Atsuko Miyaji, Mohammad Shahriar Rahman. Private Two-Party Set Intersection Protocol in Rational Model
105 -- 118João Carneiro, João Laranjeira, Goreti Marreiros, Carlos Filipe Freitas, Ricardo Santos. A Context-aware Model to Support Ubiquitous Group Decision Making
119 -- 131Sang Min Lee, Dong Seong Kim, Jong Sou Park. A Survey and Taxonomy of Lightweight Intrusion Detection Systems