Journal: J. Internet Serv. Inf. Secur.

Volume 6, Issue 4

1 -- 34Clémentine Gritti, Willy Susilo, Thomas Plantard. Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record
35 -- 53S. Sree Vivek, S. Sharmila Deva Selvi, Pallavi Chandrasekar, C. Pandu Rangan. Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives
54 -- 64Nak Young Kim, Jaewoo Shim, Seong Je Cho, Minkyu Park, Sangchul Han. Android Application Protection against Static Reverse Engineering based on Multidexing
65 -- 84Tomoyuki Ishida, Yuki Shinotsuka, Misaki Iyobe, Noriki Uchida, Kaoru Sugita, Yoshitaka Shibata. Development of a Zoo Walk Navigation System using the Positional Measurement Technology and the Wireless Communication Technology

Volume 6, Issue 3

1 -- 26Asem Kitana, Issa Traoré, Isaac Woungang. Impact Study of a Mobile Botnet over LTE Networks
27 -- 39Geonbae Na, Jongsu Lim, Kyoungmin Kim, Jeong Hyun Yi. Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
40 -- 60Siamak Aram, Rouzbeh A. Shirvani, Eros Pasero, Mohamed F. Chouikha. Implantable Medical Devices; Networking Security Survey
61 -- 113Tapas Pandit, Sumit Kumar Pandey, Rana Barua. Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version)

Volume 6, Issue 2

1 -- 22Asem Kitana, Issa Traoré, Isaac Woungang. Impact Study of a Mobile Botnet over LTE Networks
23 -- 36Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai. A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints
37 -- 52Borja Bordel Sánchez, Diego Sánchez de Rivera, Álvaro Sánchez-Picot. Building unobtrusive wearable devices: an ergonomic cybernetic glove
53 -- 69Qian He, Qinghe Dong, BaoKang Zhao, Yong Wang, Baohua Qiang. P2P Traffic Optimization based on Congestion Distance and DHT

Volume 6, Issue 1

1 -- 0Fang-Yie Leu. Editorial
2 -- 19Takashi Kurokawa 0001, Ryo Nojima, Shiho Moriai. On the security of CBC Mode in SSL3.0 and TLS1.0
20 -- 36Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol, Ram Dantu. Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals
37 -- 46Nobuhide Kobayashi, Shuji Morisaki, Noritoshi Atsumi, Shuichiro Yamamoto. Quantitative Non Functional Requirements evaluation using softgoal weight
47 -- 56Chien-Erh Weng, Vishal Sharma, Hsing-Chung Chen, Chuan-Hsien Mao. PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks