Abstract is missing.
- A DRM framework towards preventing digital piracyRavi Sankar Veerubhotla, Ashutosh Saxena. 1-6 [doi]
- Multifactor graphical passwords: An assessment of end-user performanceMohd Zalisham Jali, Steven Furnell, Paul Dowland. 7-12 [doi]
- Comparison of digital audio watermarking techniques for the security of VOIP communicationsFusun Citak Er, Ensar Gul. 13-18 [doi]
- A security analysis of smartphone data flow and feasible solutions for lawful interceptionMithun Paul, Nitin Singh Chauhan, Ashutosh Saxena. 19-24 [doi]
- Understanding vulnerabilities by refining taxonomyNurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan. 25-29 [doi]
- Robust video watermarking against JPEG compression in 3D-DWT domainYadollah Zamanidoost, António Navarro, Zhinoos Razavi Hesabi, Nima Rahimi Froshani, Fatemeh Farnia. 30-34 [doi]
- Fixed size encoding scheme for software watermarkingAzyan Yusra Kapi, Subariah Ibrahim. 35-39 [doi]
- Cryptanalysis of the full CHAIN cipherWun-She Yap, Sze-Ling Yeo, Chee Hoo Yian. 40-45 [doi]
- Analysis on Lightweight Block Cipher, KTANTANNik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani. 46-51 [doi]
- Developing a grand strategy for Cyber WarAndrew M. Colarik, Lech J. Janczewski. 52-57 [doi]
- Surveying the Wireless Body Area Network in the realm of wireless communicationSofia Najwa Ramli, Rabiah Ahmad. 58-61 [doi]
- Towards data centric mobile securityAli Dehghantanha, Nur Izura Udzir, Ramlan Mahmod. 62-67 [doi]
- Distributed access control for social networksAdnan Ahmad, Brian Whitworth. 68-73 [doi]
- Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detectionYuxin Meng, Lam-for Kwok. 74-79 [doi]
- Ensemble based categorization and adaptive model for malware detectionMuhammad Najmi Ahmad Zabidi, Mohd Aizaini Maarof, Anazida Zainal. 80-85 [doi]
- The new services in Nagios: Network bandwidth utility, email notification and sms alert in improving the network performanceMohammad Ali Arsyad bin Mohd Shuhaimi, Zaheera binti Zainal Abidin, Irda binti Roslan, Syarulnaziah binti Anawar. 86-91 [doi]
- State convergence and the effectiveness of time-memory-data tradeoffsSui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson. 92-97 [doi]
- Trusted anonymizer-based RFID system with integrity verificationMohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya. 98-103 [doi]
- High capacity and inaudibility audio steganography schemeHaider Ismael Shahadi, Razali Jidin. 104-109 [doi]
- State of the art: Signature verification systemTee Wilkin, Ooi Shih Yin. 110-115 [doi]
- Secure Vault: A privacy preserving reliable architecture for Secure Social NetworkingSiddharth Malik, Anjali Sardana. 116-121 [doi]
- Preventing data leakage in service orchestrationThomas Demongeot, Eric Totel, Yves Le Traon. 122-127 [doi]
- Extending Dempster Shafer method by multilayer decision template in classifier fusionMehdi Salkhordeh Haghighi, Abedin Vahedian, Hadi Sadoghi Yazdi. 128-133 [doi]
- Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection systemFatin Norsyafawati Mohd Sabri, Norita Md Norwawi, Kamaruzzaman Seman. 134-138 [doi]
- Biometric driven initiative system for passive continuous authenticationMuhammad Khurram Khan, Pei-wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao. 139-144 [doi]
- Guesswork changes in multi-processor attacksReine Lundin, Stefan Lindskog. 145-150 [doi]
- Black hole effect mitigation method in AODV routing protocolZaid Ahmad, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan. 151-155 [doi]
- A semantic analysis approach to manage IDS alerts floodingSherif Saad, Issa Traoré. 156-161 [doi]
- Reversible watermarking using Residue Number SystemAtta-ur-Rahman, Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muhammad Zeeshan Muzaffar. 162-166 [doi]
- Hybrid Intelligent Decision Support System for credit risk assessmentHamid Reza Taremian, Mahdi Pakdaman Naeini. 167-172 [doi]
- Investigation of bypassing malware defences and malware detectionsFarid Daryabar, Ali Dehghantanha, Nur Izura Udzir. 173-178 [doi]
- A cooperative intrusion detection scheme for clustered mobile ad hoc networksHajar Al-Hujailan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan. 179-185 [doi]
- An extended rights expression model supporting dynamic digital rights managementDongyang Xu, Zhi Tang, Yinyan Yu. 186-191 [doi]
- Intrusion detection based on k-means clustering and OneR classificationZ. Muda, W. Yassin, Md Nasir Sulaiman, N. I. Udzir. 192-197 [doi]
- Integrating OAuth with Information card systemsHaitham S. Al-Sinani. 198-203 [doi]
- An SIR model for the propagation of topology-aware active worms considering the join and leave of hostsAhmad Jafarabadi, Mohammad Abdollahi Azgomi. 204-209 [doi]
- Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authenticationSairul I. Safie, John J. Soraghan, Lykourgos Petropoulakis. 210-214 [doi]
- A new approach to evaluating security assuranceMoussa Ouedraogo, Haralambos Mouratidis, Artur Hecker, Cédric Bonhomme, Djamel Khadraoui, Eric Dubois 0001, David Preston. 215-221 [doi]
- A secure joint wavelet based steganography and secret sharing methodMohammad Javad Khosravi, Samaneh Ghandali. 222-227 [doi]
- Slow port scanning detectionMehiar Dabbagh, Ali J. Ghandour, Kassem Fawaz, Wassim El-Hajj, Hazem M. Hajj. 228-233 [doi]
- On the capacity of fingerprinting codes against unknown size of colludersGou Hosoya, Hideki Yagi, Manabu Kobayashi, Shigeichi Hirasawa. 234-239 [doi]
- Key based bit level genetic cryptographic technique (KBGCT)Subhranil Som, Niladri Shekhar Chatergee, J. K. Mandal. 240-245 [doi]
- Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibilityAbdul Rahman Ahlan, Muharman Lubis. 246-250 [doi]
- Energy efficient delay leap routing in multicast using feed back neural networksMohammad Uruj Jaleel, Mohammad Asghar Jamil, Kashiful Haq. 251-255 [doi]
- Access control taxonomy for social networksAdnan Ahmad, Brian Whitworth. 256-261 [doi]
- 1Sheng Li, Alex C. Kot. 262-266 [doi]
- AES: Current security and efficiency analysis of its alternativesHerman Isa, Iskandar Bahari, Hasibah Sufian, Muhammad Reza Z'aba. 267-274 [doi]
- A common key encryption algorithm using N-dimensional Hilbert curvesSei-ichiro Kamata. 275-279 [doi]
- Strategic approach for high performance object tracking in a network of surveillance camerasH. H. Weerasena, P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. A. A. Niroshika, P. R. Wijenayake. 280-285 [doi]
- Enhanced sharing and privacy in distributed information sharing environmentsAhmad Kamran Malik, Schahram Dustdar. 286-291 [doi]
- AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluationAbidalrahman Moh'd, Yaser Jararweh, Lo'ai Ali Tawalbeh. 292-297 [doi]
- An identity based beta cryptosystemChandrashekhar Meshram, Suchitra A. Meshram. 298-303 [doi]
- Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia SubsystemsElham Nosrati, S. Navid Hashemi Tonekaboni, S. Majid Hashemi Tonekaboni. 304-307 [doi]
- Time and energy cost analysis of Kerberos security protocol in Wireless Sensor NetworksFarshad Amin, Amir-Hossein Jahangir. 308-313 [doi]
- Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fieldsSimona Samardjiska, Yanling Chen, Danilo Gligoroski. 314-319 [doi]
- A fast eavesdropping attack against touchscreensFederico Maggi, Simone Gasparini, Giacomo Boracchi. 320-325 [doi]
- Efficient iris recognition system based on dual boundary detection using robust variable learning rate Multilayer Feed Forward neural networkMohtashim Baqar, Sohaib Azhar, Zeeshan Iqbal, Irfan Shakeel, Laeeq Ahmed, Muhammad Moinuddin. 326-330 [doi]
- A two-tier energy-efficient secure routing protocol for Wireless Sensor NetworksAly M. El-Semary, Mohamed Mostafa A. Azim. 331-337 [doi]
- Holistic analysis of mix protocolsGiampaolo Bella, Denis Butin, David Gray. 338-343 [doi]
- Enhance hardware security using FIFO in pipelinesKuan Jen Lin, Chih Ping Weng, Tsai Kun Hou. 344-349 [doi]
- A novel intrusion detection framework for Wireless Sensor NetworksMurad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal. 350-353 [doi]
- A comparative study of feature extraction using PCA and LDA for face recognitionErwin Hidayat, Nur A. Fajrian, Azah Kamilah Muda, Yun-Huoy Choo, Sabrina Ahmad. 354-359 [doi]
- H.264/AVC digital fingerprinting based on content adaptive embeddingKarima Ait Saadi, Ahmed Bouridane, Abdelrazek Guessoum. 360-365 [doi]
- What is Green Security?Luca Caviglione, Alessio Merlo, Mauro Migliardi. 366-371 [doi]
- OpenID authentication as a service in OpenStackRasib Hassan Khan, Jukka Ylitalo, Abu Shohel Ahmed. 372-377 [doi]
- A SLA-based interface for security management in cloud and GRID integrationsMassimiliano Rak, Loredana Liccardo, Rocco Aversa. 378-383 [doi]