Volume 4 (2014)
Issue 1, March 2014
Pages | Title | Author(s) | Papers |
383 - 390 | Two-Factor User Authentication with SMS and Voiceprint Challenge Response DOI: 10.20533/ijisr.2042.4639.2014.0044 |
Haruhiko Fujii, Yukio Tsuruoka | |
391 - 399 | An Alternate Secure Element Access Control for NFC Enabled Android Smartphones DOI: 10.20533/ijisr.2042.4639.2014.0045 |
Waqar Anwar, Dale Lindskog, Pavol Zavarsky, Ron Ruhl | |
400 - 407 | Formal Analysis of an Authentication Protocol against External Cloud-Based Denial-of-Service (DoS) Attack DOI: 10.20533/ijisr.2042.4639.2014.0046 |
Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz | |
408 - 417 | Ambient Privacy with Wireless Grids: Forging New Concepts of Relationship in 21st Century Information Society DOI: 10.20533/ijisr.2042.4639.2014.0047 |
H. Patricia McKenna, Marilyn P. Arnone, Michelle L. Kaarst-Brown, Lee W. McKnight, Sarah Chauncey |
Issue 2, June 2014
Pages | Title | Author(s) | Papers |
418 - 426 | AODV Routing Protocol Performance Analysis under MANET Attacks DOI: 10.20533/ijisr.2042.4639.2014.0048 |
Mohamed A. Abdelshafy, Peter J. B. King | |
427 - 431 | An Overview of Threats and Security Software Solutions for Smartphones DOI: 10.20533/ijisr.2042.4639.2014.0049 |
D. Fischer, B. Markscheffel, and T. Seyffarth | |
432 - 438 | Modified GPT Cryptosystem for Information Network Security DOI: 10.20533/ijisr.2042.4639.2014.0050 |
Ernst Gabidulin, Nina Pilipchuk | |
439 - 448 | Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11i Standard DOI: 10.20533/ijisr.2042.4639.2014.0051 |
Abdullah Alabdulatif, Xiaoqi Ma |
Issue 3, September 2014
Pages | Title | Author(s) | Papers |
449 - 458 | Edwards Curves and Extended Jacobi Quartic-Curves for Efficient Support of Elliptic-Curve Cryptosystems in Embedded Systems DOI: 10.20533/ijisr.2042.4639.2014.0052 |
Chiara Peretti, Alessio Leoncini, Paolo Gastaldo, Rodolfo Zunino | |
459 - 468 | Maintaining Provenance throughout the Additive Manufacturing Process DOI: 10.20533/ijisr.2042.4639.2014.0053 |
Nawfal F. Fadhel, Richard M. Crowder, Gary B. Wills | |
469 - 477 | Practical Fully Homomorphic Encryption for Integers over Polynomial Quotient Rings DOI: 10.20533/ijisr.2042.4639.2014.0054 |
Alexander Zhirov, Olga Zhirova, Sergey F. Krendelev | |
478 - 489 | Data Model Development for Security Information Sharing in Smart Grids DOI: 10.20533/ijisr.2042.4639.2014.0055 |
Rafal Leszczyna, Michal R. Wróbel |
Issue 4, December 2014
Pages | Title | Author(s) | Papers |
490 - 500 | Defending Critical Information Infrastructure from Cyberattacks through the Use of Security Controls in Layers DOI: 10.20533/ijisr.2042.4639.2014.0056 |
Tamir Tsegaye, Stephen Flowerday | |
501 - 509 | Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices DOI: 10.20533/ijisr.2042.4639.2014.0057 |
Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan Clarke, Georgios Kambourakis | |
510 - 518 | A Customizable and Secure Software Architecture DOI: 10.20533/ijisr.2042.4639.2014.0058 |
Aspen Olmsted, RoxAnn Stalvey | |
519 - 528 | A Multicast Packet Authentication using Signature Amortization Scheme DOI: 10.20533/ijisr.2042.4639.2014.0059 |
C. A. Opayinka, B.K. Alese, A. F. Thompson, O. D. Alowolodu, Festus A. Osuolale |