Issue 1, March 2014

Pages Title Author(s) Papers
383 - 390 Two-Factor User Authentication with SMS and Voiceprint Challenge Response

DOI: 10.20533/ijisr.2042.4639.2014.0044
Haruhiko Fujii, Yukio Tsuruoka Download Paper
391 - 399 An Alternate Secure Element Access Control for NFC Enabled Android Smartphones

DOI: 10.20533/ijisr.2042.4639.2014.0045
Waqar Anwar, Dale Lindskog, Pavol Zavarsky, Ron Ruhl Download Paper
400 - 407 Formal Analysis of an Authentication Protocol against External Cloud-Based Denial-of-Service (DoS) Attack

DOI: 10.20533/ijisr.2042.4639.2014.0046
Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz Download Paper
408 - 417 Ambient Privacy with Wireless Grids: Forging New Concepts of Relationship in 21st Century Information Society

DOI: 10.20533/ijisr.2042.4639.2014.0047
H. Patricia McKenna, Marilyn P. Arnone, Michelle L. Kaarst-Brown, Lee W. McKnight, Sarah Chauncey Download Paper

Issue 2, June 2014

Pages Title Author(s) Papers
418 - 426 AODV Routing Protocol Performance Analysis under MANET Attacks

DOI: 10.20533/ijisr.2042.4639.2014.0048
Mohamed A. Abdelshafy, Peter J. B. King Download Paper
427 - 431 An Overview of Threats and Security Software Solutions for Smartphones

DOI: 10.20533/ijisr.2042.4639.2014.0049
D. Fischer, B. Markscheffel, and T. Seyffarth Download Paper
432 - 438 Modified GPT Cryptosystem for Information Network Security

DOI: 10.20533/ijisr.2042.4639.2014.0050
Ernst Gabidulin, Nina Pilipchuk Download Paper
439 - 448 Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11i Standard

DOI: 10.20533/ijisr.2042.4639.2014.0051
Abdullah Alabdulatif, Xiaoqi Ma Download Paper

Issue 3, September 2014

Pages Title Author(s) Papers
449 - 458 Edwards Curves and Extended Jacobi Quartic-Curves for Efficient Support of Elliptic-Curve Cryptosystems in Embedded Systems

DOI: 10.20533/ijisr.2042.4639.2014.0052
Chiara Peretti, Alessio Leoncini, Paolo Gastaldo, Rodolfo Zunino Download Paper
459 - 468 Maintaining Provenance throughout the Additive Manufacturing Process

DOI: 10.20533/ijisr.2042.4639.2014.0053
Nawfal F. Fadhel, Richard M. Crowder, Gary B. Wills Download Paper
469 - 477 Practical Fully Homomorphic Encryption for Integers over Polynomial Quotient Rings

DOI: 10.20533/ijisr.2042.4639.2014.0054
Alexander Zhirov, Olga Zhirova, Sergey F. Krendelev Download Paper
478 - 489 Data Model Development for Security Information Sharing in Smart Grids

DOI: 10.20533/ijisr.2042.4639.2014.0055
Rafal Leszczyna, Michal R. Wróbel Download Paper

Issue 4, December 2014

Pages Title Author(s) Papers
490 - 500 Defending Critical Information Infrastructure from Cyberattacks through the Use of Security Controls in Layers

DOI: 10.20533/ijisr.2042.4639.2014.0056
Tamir Tsegaye, Stephen Flowerday Download Paper
501 - 509 Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices

DOI: 10.20533/ijisr.2042.4639.2014.0057
Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan Clarke, Georgios Kambourakis Download Paper
510 - 518 A Customizable and Secure Software Architecture

DOI: 10.20533/ijisr.2042.4639.2014.0058
Aspen Olmsted, RoxAnn Stalvey Download Paper
519 - 528 A Multicast Packet Authentication using Signature Amortization Scheme

DOI: 10.20533/ijisr.2042.4639.2014.0059
C. A. Opayinka, B.K. Alese, A. F. Thompson, O. D. Alowolodu, Festus A. Osuolale Download Paper
0