Issue 1, March 2014

383 - 390Two-Factor User Authentication with SMS and Voiceprint Challenge Response

DOI: 10.20533/ijisr.2042.4639.2014.0044
Haruhiko Fujii, Yukio Tsuruoka Download Paper
391 - 399An Alternate Secure Element Access Control for NFC Enabled Android Smartphones

DOI: 10.20533/ijisr.2042.4639.2014.0045
Waqar Anwar, Dale Lindskog, Pavol Zavarsky, Ron Ruhl Download Paper
400 - 407Formal Analysis of an Authentication Protocol against External Cloud-Based Denial-of-Service (DoS) Attack

DOI: 10.20533/ijisr.2042.4639.2014.0046
Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz Download Paper
408 - 417Ambient Privacy with Wireless Grids: Forging New Concepts of Relationship in 21st Century Information Society

DOI: 10.20533/ijisr.2042.4639.2014.0047
H. Patricia McKenna, Marilyn P. Arnone, Michelle L. Kaarst-Brown, Lee W. McKnight, Sarah Chauncey Download Paper

Issue 2, June 2014

418 - 426AODV Routing Protocol Performance Analysis under MANET Attacks

DOI: 10.20533/ijisr.2042.4639.2014.0048
Mohamed A. Abdelshafy, Peter J. B. King Download Paper
427 - 431An Overview of Threats and Security Software Solutions for Smartphones

DOI: 10.20533/ijisr.2042.4639.2014.0049
D. Fischer, B. Markscheffel, and T. Seyffarth Download Paper
432 - 438Modified GPT Cryptosystem for Information Network Security

DOI: 10.20533/ijisr.2042.4639.2014.0050
Ernst Gabidulin, Nina Pilipchuk Download Paper
439 - 448Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11i Standard

DOI: 10.20533/ijisr.2042.4639.2014.0051
Abdullah Alabdulatif, Xiaoqi Ma Download Paper

Issue 3, September 2014

449 - 458Edwards Curves and Extended Jacobi Quartic-Curves for Efficient Support of Elliptic-Curve Cryptosystems in Embedded Systems

DOI: 10.20533/ijisr.2042.4639.2014.0052
Chiara Peretti, Alessio Leoncini, Paolo Gastaldo, Rodolfo Zunino Download Paper
459 - 468Maintaining Provenance throughout the Additive Manufacturing Process

DOI: 10.20533/ijisr.2042.4639.2014.0053
Nawfal F. Fadhel, Richard M. Crowder, Gary B. Wills Download Paper
469 - 477Practical Fully Homomorphic Encryption for Integers over Polynomial Quotient Rings

DOI: 10.20533/ijisr.2042.4639.2014.0054
Alexander Zhirov, Olga Zhirova, Sergey F. Krendelev Download Paper
478 - 489Data Model Development for Security Information Sharing in Smart Grids

DOI: 10.20533/ijisr.2042.4639.2014.0055
Rafal Leszczyna, Michal R. Wróbel Download Paper

Issue 4, December 2014

490 - 500Defending Critical Information Infrastructure from Cyberattacks through the Use of Security Controls in Layers

DOI: 10.20533/ijisr.2042.4639.2014.0056
Tamir Tsegaye, Stephen Flowerday Download Paper
501 - 509Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices

DOI: 10.20533/ijisr.2042.4639.2014.0057
Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan Clarke, Georgios Kambourakis Download Paper
510 - 518A Customizable and Secure Software Architecture

DOI: 10.20533/ijisr.2042.4639.2014.0058
Aspen Olmsted, RoxAnn Stalvey Download Paper
519 - 528A Multicast Packet Authentication using Signature Amortization Scheme

DOI: 10.20533/ijisr.2042.4639.2014.0059
C. A. Opayinka, B.K. Alese, A. F. Thompson, O. D. Alowolodu, Festus A. Osuolale Download Paper