Issue 1, March 2017

701 - 705Advanced 3-DES Block Based LSB Algorithm for Image Steganography

DOI: 10.20533/ijisr.2042.4639.2017.0081
Shreyank N. Gowda Download Paper
706 - 713FPGA Based Crypto Processor for Elliptic Curve Point Multiplication (ECPM) Over GF(2233)

DOI: 10.20533/ijisr.2042.4639.2017.0082
Malik Imran, Faisal Shehzad Download Paper
714 - 724Evaluating DBaaS Offerings

DOI: 10.20533/ijisr.2042.4639.2017.0083
Irina Astrova, Arne Koschel, Chris Eickemeyer, Jan Kersten, Norman Offel Download Paper

Issue 2, June 2017

725 - 733Authentication by Touch Operation on Smartphone with Support Vector Machine

DOI: 10.20533/ijisr.2042.4639.2017.0084
Nozomi Miyamoto, Chihiro Shibata, Toshiyuki Kinoshita Download Paper
734 - 743A Systematic Literature Review of Behavioural Profiling for Smartphone Security: Challenges and Open Problems

DOI: 10.20533/ijisr.2042.4639.2017.0085
Saud Alotaibi, Abdulrahman Alruban Download Paper
744 - 754An Evaluation of Secure Storage of Authentication Data

DOI: 10.20533/ijisr.2042.4639.2017.0086
Juanita Blue, Eoghan Furey, Kevin Curran Download Paper
755 - 763Protection Against Broadcast Based Runtime Information Gathering on an Unrooted Android Operating System

DOI: 10.20533/ijisr.2042.4639.2017.0087
Prashant Hari Narayan Rajput, Altaf Shaikh, Priyanka Sapka Download Paper