Journal: J. Internet Serv. Inf. Secur.

Volume 3, Issue 3/4

1 -- 16José Luis Hernández Ramos, Antonio J. Jara, Leandro Marín, Antonio F. Skarmeta. Distributed Capability-based Access Control for the Internet of Things
17 -- 27Hyungdong Kim, YongJe Choi, Dooho Choi, JaeCheol Ha. A New Exponentiation Algorithm Resistant to Combined Side Channel Attack
28 -- 37Junho Choi, Chang Choi, Byeongkyu Ko, Dongjin Choi, PanKoo Kim. Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment
38 -- 51Kunwar Singh, C. Pandu Rangan, A. K. Banerjee. Lattice Based Identity Based Proxy Re-Encryption Scheme
52 -- 62Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller. Externalizing Behaviour for Analysing System Models
63 -- 71Hwan-taek Lee, Minkyu Park, Seong Je Cho. Detection and prevention of LeNa Malware on Android
72 -- 80Ho Seok Kang, Sung-Ryul Kim. A New Logging-based IP Traceback Approach using Data Mining Techniques
81 -- 93Shigeyoshi Shima, Ayako Komatsu. Guidelines for the Prevention of Internal Improprieties in Japanese Organization
94 -- 105Hyejoo Lee, Changho Seo, Sang Uk Shin. DRM Cloud Architecture and Service Scenario for Content Protection
106 -- 115Jun Ye, Xiaofeng Chen 0001, Jianfeng Ma. Constructing Verifiable Random Number in Finite Field
116 -- 123Yonglin Zhou, Qing-Shan Li, Qidi Miao, Kangbin Yim. DGA-Based Botnet Detection Using DNS Traffic
124 -- 135Guowei Wu, Zuosong Liu, Lin Yao, Zhenzhen Xu, Wei Wang 0077. A Fuzzy-based Trust Management in WSNs
136 -- 145Jaein Kim, YoungJun Lee, Kyungroul Lee, Taeyoung Jung, Dmitry Volokhov, Kangbin Yim. Vulnerability to Flash Controller for Secure USB Drives

Volume 3, Issue 1/2

1 -- 4BaoKang Zhao, Chunqing Wu, Qin Xin. Guest Editorial: Special Issue on Advances in Internet Security and Technology
5 -- 19Kunwar Singh, C. Pandurangan, A. K. Banerjee. Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext
20 -- 36Salim Allal, Saadi Boudjit. Geocast Routing Protocols for VANETs: Survey and Geometry-Driven Scheme Proposal
37 -- 48Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang. Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks
49 -- 70Marek Dabrowski, Justyna Gromada, Hassnaa Moustafa, Jacky Forestier. A context-aware architecture for IPTV services personalization
71 -- 82Liang Sun, Fei Song, Dong Yang, Yajuan Qin. DHR-CCN, Distributed Hierarchical Routing for Content Centric Network
83 -- 100Liang (Ben) Chen, Maria Prokopi. Enabling Resource-Aware Ubiquitous Applications for Personal Cloud with a Pairing Device Framework
101 -- 114Denys A. Flores, Olga Angelopoulou, Richard J. Self. An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together
115 -- 137S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan. Efficient Certificateless Online/Offline Signature with tight security