Issue 1, March 2012

PagesTitleAuthor(s)Papers
106 - 112Hardware Implementation of Elliptic Curve Point Multiplication over GF(2m) for ECC protocols

DOI: 10.20533/ijisr.2042.4639.2012.0013
Moncef Amara, Amar Siad Download Paper
113 - 120Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet

DOI: 10.20533/ijisr.2042.4639.2012.0014
Hao Zhao, Sead Muftic Download Paper
121 - 131User-Profile Framework against a Spit Attack on VoIP Systems

DOI: 10.20533/ijisr.2042.4639.2012.0015
Marialisa Scatá, Aurelio La Corte Download Paper

Issue 2, June 2012

PagesTitleAuthor(s)Papers
132 - 139Improvements on Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the 1999 KDD Cup Dataset

DOI: 10.20533/ijisr.2042.4639.2012.0016
Ryan Wilson, Charlie Obimbo Download Paper
140 - 143User Identification: Bio-Inspired Visual User Detection

DOI: 10.20533/ijisr.2042.4639.2012.0017
W. Han, I. S. Han Download Paper
144 - 153Privacy and Security of DHCP Unique Identifiers

DOI: 10.20533/ijisr.2042.4639.2012.0018
Stephen Groat, Matthew Dunlop, Randy Marchany, Joseph Tront Download Paper
154 - 163Node Management without Directory Servers in DHT-based Anonymous Communication Systems using ID-based Encryption

DOI: 10.20533/ijisr.2042.4639.2012.0019
Hiroyuki Tanaka, Shoichi Saito, Hiroshi Matsuo Download Paper

Issue 3, September 2012

PagesTitleAuthor(s)Papers
164 - 168On the Identification of Information Extracted from Windows Physical Memory

DOI: 10.20533/ijisr.2042.4639.2012.0020
Funminiyi Olajide, Nick Savage Download Paper
169 - 177Advanced DDoS Attacks Traffic Simulation with a Test Center Platform

DOI: 10.20533/ijisr.2042.4639.2012.0021
Jie Wang, Raphael C.-W. Phan, John N.Whitley and David J. Parish Download Paper
178 - 182A New CVSS-Based Tool to Mitigate the Effects of Software Vulnerabilities

DOI: 10.20533/ijisr.2042.4639.2012.0022
Assad Ali, Pavol Zavarsky, Dale Lindskog, Ron Ruhl Download Paper
183 - 192Towards Securing Databases on Mobile Devices: A Log-based Approach

DOI: 10.20533/ijisr.2042.4639.2012.0023
Subhasish Mazumdar, Anand Paturi Download Paper

Issue 4, December 2012

PagesTitleAuthor(s)Papers
193 - 201A Reconfigurable Hardware Platform for Secure and Efficient Malware Collection in Next-Generation High-Speed Networks

DOI: 10.20533/ijisr.2042.4639.2012.0024
Sascha Mühlbach, Andreas Koch Download Paper
202 - 210One-Dependence Estimators for Accurate Detection of Anomalous Network Traffic

DOI: 10.20533/ijisr.2042.4639.2012.0025
Zubair A. Baig, Abdulrhman S. Shaheen, and Radwan AbdelAal Download Paper
211 - 218Linearisation Attacks on FCSR-based Stream Ciphers

DOI: 10.20533/ijisr.2042.4639.2012.0026
Arshad Ali Download Paper
219 - 228Display Integrity Assurance for SMS Transaction Authorization

DOI: 10.20533/ijisr.2042.4639.2012.0027
Mohammed Alzomai, Audun Jøsang, Bander Alfayyadh Download Paper