Network optimisation for improving security and safety level of dangerous goods transportation based on cloud computing
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018470
Cloud-based DDoS attack detection and defence system using statistical approach
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018796
SQL injection attacks - a systematic review
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023476
A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023470
Novel implementation of defence strategy of relay attack based on cloud in RFID systems
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10007915
Reconfigurable design and implementation of nonlinear Boolean function for cloud computing security platform
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018855
PrivacyContext: identifying malicious mobile privacy leak using program context
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10024486
A study of the internet financial interest rate risk evaluation index system in cloud computing
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018852
A generic construction of identity-based proxy signature scheme in the standard model
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10016329
Study on data fuzzy breakpoint detection in massive dynamic data flow
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10024487
An ontology-based approach to improve access policy administration of attribute-based access control
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023471
Image encryption scheme based on a novel fractional order compound chaotic attractor
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10027643
Password security by encryption using an extended ADFGVX cipher
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023477
An efficient authentication and key agreement scheme for e-health applications in the context of internet of things
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018795
Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10013935
An efficient user authentication model for IOT-based healthcare environment
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10023077
SPHERES: an efficient server-side web application protection system
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10017572
An authentication scheme for distributed computing environment
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10023136
Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10017217
Reversible data hiding methods in integer wavelet transform
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10014436
MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10014390
CB-ALCA: a cluster-based adaptive lightweight cryptographic algorithm for secure routing in wireless sensor networks
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10023268
Detection algorithm for internet worms scanning that used user datagram protocol
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10016150
A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023472
A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10017573
Comparative evaluation of different classification techniques for masquerade attack detection
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10020664
An ensemble algorithm for discovery of malicious web pages
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10020533
Proofs of retrievability from linearly homomorphic structure-preserving signatures
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018857
Outsourcing computation for private function evaluation
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10024485
CSPS: catchy short passwords making offline and online attacks impossible
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018618
VIKAS: a new virtual keyboard-based simple and efficient text CAPTCHA verification scheme
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018472