Volume 7 (2017)
Issue 1, March 2017
Pages | Title | Author(s) | Papers |
701 - 705 | Advanced 3-DES Block Based LSB Algorithm for Image Steganography DOI: 10.20533/ijisr.2042.4639.2017.0081 |
Shreyank N. Gowda |
![]() |
706 - 713 | FPGA Based Crypto Processor for Elliptic Curve Point Multiplication (ECPM) Over GF(2233) DOI: 10.20533/ijisr.2042.4639.2017.0082 |
Malik Imran, Faisal Shehzad |
![]() |
714 - 724 | Evaluating DBaaS Offerings DOI: 10.20533/ijisr.2042.4639.2017.0083 |
Irina Astrova, Arne Koschel, Chris Eickemeyer, Jan Kersten, Norman Offel |
![]() |
Issue 2, June 2017
Pages | Title | Author(s) | Papers |
725 - 733 | Authentication by Touch Operation on Smartphone with Support Vector Machine DOI: 10.20533/ijisr.2042.4639.2017.0084 |
Nozomi Miyamoto, Chihiro Shibata, Toshiyuki Kinoshita |
![]() |
734 - 743 | A Systematic Literature Review of Behavioural Profiling for Smartphone Security: Challenges and Open Problems DOI: 10.20533/ijisr.2042.4639.2017.0085 |
Saud Alotaibi, Abdulrahman Alruban |
![]() |
744 - 754 | An Evaluation of Secure Storage of Authentication Data DOI: 10.20533/ijisr.2042.4639.2017.0086 |
Juanita Blue, Eoghan Furey, Kevin Curran |
![]() |
755 - 763 | Protection Against Broadcast Based Runtime Information Gathering on an Unrooted Android Operating System DOI: 10.20533/ijisr.2042.4639.2017.0087 |
Prashant Hari Narayan Rajput, Altaf Shaikh, Priyanka Sapka |
![]() |