Journal: JoWUA

Volume 4, Issue 4

1 -- 19William R. Claycomb, Carly L. Huth. A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage
20 -- 37Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese. Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
38 -- 48Christian W. Probst, René Rydhof Hansen. Reachability-based Impact as a Measure for Insiderness
49 -- 64Dongwan Shin, Huiping Yao. A User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone
65 -- 79Jian Xu, Yuxi Li, Jingwei Miao, Fucai Zhou. The Electronic Cash Protocol Based on Dynamic Group Signature
80 -- 92Wonjun Cho, Youngho Park, Chul Sur, Kyung Hyune Rhee. An Improved Privacy-Preserving Navigation Protocol in {VANET}s
93 -- 107Kunwar Singh, C. Pandu Rangan, A. K. Banerjee. Lattice Based Efficient Threshold Public Key Encryption Scheme
108 -- 121Jiwan Seo, Seungjin Choi, Mucheol Kim, Sangyong Han. The Method of Personalized Recommendation with Ensemble Combination

Volume 4, Issue 3

1 -- 22Chia-Hsuan Chang, Chia-Lung Liu, Hsi-Lu Chao, Kuei-Li Huang, Yi-Bing Lin. A Novel LIPA Scheme for LTE VoIP Services with Home eNBs
23 -- 40Sarada Prasad Gochhayat, Pallapa Venkataram. Performance Analysis of a Priority based Resource Allocation Scheme in Ubiquitous Networks
41 -- 57Mayumi Takaya, Yusuke Tsuruta, Akihiro Yamamura. Reverse Turing Test using Touchscreens and CAPTCHA
58 -- 78Atta Badii, Davide Carboni, Antonio Pintus, Andrea Piras, Alberto Serra, Marco Tiemann, Nagarajan Viswanathan. CityScripts: Unifying Web, IoT and Smart City Services in a Smart Citizen Workspace
79 -- 96László Virág, József Kovács, András Edelmayer. Interacting Advanced ITS Communications with Low-Power Sensor Networks
97 -- 118Antonio J. Jara, Latif Ladid, Antonio F. Gómez-Skarmeta. The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities

Volume 4, Issue 2

1 -- 17Pelin Angin, Bharat K. Bhargava. An Agent-based Optimization Framework for Mobile-Cloud Computing
18 -- 38Weicheng Huai, Zhuzhong Qian, Xin Li, Gangyi Luo, Sanglu Lu. Energy Aware Task Scheduling in Data Centers
39 -- 62Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez, David Gross-Amblard. Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption
63 -- 76Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani. Clustering Models in Secure Clustered Multiparty Computation
77 -- 96Richard K. Lomotey, Ralph Deters. Facilitating Multi-Device Usage in mHealth
97 -- 103Kensuke Baba, Serina Egawa. On the Order of Search for Personal Identification with Biometric Images
104 -- 113Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu. Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation

Volume 4, Issue 1

1 -- 3Edgar R. Weippl, A Min Tjoa, Simon Tjoa. Frontiers in Security and Dependability
4 -- 31David Cadé, Bruno Blanchet. From Computationally-Proved Protocol Specifications to Implementations and Application to SSH
32 -- 54Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu. Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications
55 -- 75Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang. Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System
76 -- 97Stefan Craß, Tobias Dönz, Gerson Joskowicz, eva Kühn, Alexander Marek. Securing a Space-Based Service Architecture with Coordination-Driven Access Control
98 -- 117Raja Khurram Shahzad, Niklas Lavesson. Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection
118 -- 134Yutaka Matsuno, Shuichiro Yamamoto. A Framework for Dependability Consensus Building and In-Operation Assurance
135 -- 152Rainer Poisel, Erich Malzer, Simon Tjoa. Evidence and Cloud Computing: The Virtual Machine Introspection Approach