Abstract is missing.
- Evolution of cryptographic hashingJosef Pieprzyk. 1 [doi]
- Integral engineering technique for information security methodologiesAlexander V. Lyubimov. 3-11 [doi]
- An application of integral engineering technique to information security standards analysis and refinementDmitry V. Cheremushkin, Alexander V. Lyubimov. 12-18 [doi]
- Towards a system-wide and transparent security mechanism using language-level information flow controlMohammad Reza Azadmanesh, Mohsen Sharifi. 19-26 [doi]
- A trust quantification method based on grey fuzzy theoryShunan Ma, Jingsha He, Feng Gao, Yuqiang Zhang. 27-31 [doi]
- Bachelor of information security: ( automated systems security profile )Alexander I. Tolstoy, Natalia G. Miloslavskaya. 32-37 [doi]
- Protecting user privacy with multi-field anonymisation of ip addressesCarsten Schmoll, Nikolaos Chatzis, Christian Henke. 38-45 [doi]
- Analysis of privacy in online social networks of runetSlava Kisilevich, Florian Mansmann. 46-55 [doi]
- The weak and the strong password preferences: a case study on turkish usersIlker Korkmaz, Mehmet Emin Dalkiliç. 56-61 [doi]
- A calculus for the qualitative risk assessment of policy override authorizationSteffen Bartsch. 62-70 [doi]
- Rating the raters: a reputation system for wiki-like domainsAlexis Velarde Pantola, Susan Pancho-Festin, Florante Salvador. 71-80 [doi]
- Trust based multi-path routing for end to end secure data delivery in manetsPoonam Gera, Kumkum Garg, Manoj Misra. 81-89 [doi]
- Digital camera identification based on rotated imagesDmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich. 90-93 [doi]
- The development of information security operational management system based on the intelligent technologiesIrina V. Mashkina, Timur Kh. Tukhvatshin, Murat B. Guzairov. 94-99 [doi]
- Ontological approach toward cybersecurity in cloud computingTakeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara. 100-109 [doi]
- Homogeneity analysis of power consumption for information security purposesTatiana Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda. 113-117 [doi]
- Permanent protection of information systems with method of automated security and integrity controlMaxim O. Kalinin. 118-123 [doi]
- Improving first order differential power attacks through digital signal processingAlessandro Barenghi, Gerardo Pelosi, Yannick Teglia. 124-133 [doi]
- Ontology-based analysis of information security standards and capabilities for their harmonizationVladimir I. Vorobiev, Ludmila N. Fedorchenko, Vadim P. Zabolotsky, Alexander V. Lyubimov. 137-141 [doi]
- Cyber security quantification modelM. Asif Khan, Mureed Hussain. 142-148 [doi]
- Differential analysis of GOST encryption algorithmLyudmila K. Babenko, Evgeniya Ishchukova. 149-157 [doi]
- Elgamal public key cryptosystem and signature scheme in GU(m, p, n)Alexander G. Chefranov, Ahmed Y. Mahmoud. 164-167 [doi]
- Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashingAbdulkadir Akin, Aydin Aysu, Onur C. Ulusel, Erkay Savas. 168-177 [doi]
- Design and implementation of robust embedded processor for cryptographic applicationsKazim Yumbul, Serdar Süer Erdem, Erkay Savas. 178-185 [doi]
- Key management with host mobility in dynamic groupsSaid Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal. 186-194 [doi]
- Implementation and performance evaluation of the RSEP protocol on ARM and intel platformsSuleyman Kondakci, Gökhan Yilmaz. 194-202 [doi]
- Automated method for constructing of network traffic filtering rulesEvgeny Abramov, Denis Mordvin, Oleg B. Makarevich. 203-211 [doi]
- Securing RFID-based authentication systems using ParseKey+Behnam Rahnama, Atilla Elçi, Selcuk Celik. 212-217 [doi]
- A mobile IP based WLAN security management framework with reconfigurable hardware accelerationSoumya Maity, Padmalochan Bera, Soumya Kanti Ghosh. 218-223 [doi]
- A DSL for intrusion detection based on constraint programmingPedro D. Salgueiro, Salvador Abreu. 224-232 [doi]
- Immune model based approach for network intrusion detectionVadim D. Kotov, Vladimir I. Vasilyev. 233-237 [doi]
- A distributed multi-approach intrusion detection system for web servicesMeisam S. A. Najjar, Mohammad Abdollahi Azgomi. 238-244 [doi]
- FPGA based programmable embedded intrusion detection systemTaner Tuncer, Yetkin Tatar. 245-248 [doi]
- A novel defense mechanism against sybil attacks in VANETJyoti Grover, Manoj Singh Gaur, Vijay Laxmi. 249-255 [doi]
- A collusion attack detection method for OLSR-based MANETS employing scruple packetsP. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi. 256-262 [doi]
- MEDUSA: MEtamorphic malware dynamic analysis usingsignature from APIVinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi. 263-269 [doi]