Economics at your fingertips  

International Journal of Information Security and Privacy (IJISP)

2007 - 2017

Current editor(s): Li Yang

From IGI Global
Series data maintained by Journal Editor ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.

Volume 11, issue 2, 2017

An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password pp. 1-10 Downloads
Prakash Mohan and Saravanakumar Chelliah
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation pp. 11-24 Downloads
Satyanarayana Vollala, B. Shameedha Begum, Amit D. Joshi and N. Ramasubramanian
Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies pp. 25-37 Downloads
Regner Sabillon, Jordi Serra-Ruiz, Victor Cavaller and Jeimy J. Cano
PKI Deployment Challenges and Recommendations for ICS Networks pp. 38-48 Downloads
Nandan Rao, Shubhra Srivastava and Sreekanth K.S.
Framework to Secure Browser Using Configuration Analysis pp. 49-63 Downloads
Harshad Suryakant Wadkar, Arun Mishra and Arati M. Dixit

Volume 11, issue 1, 2017

Privacy and Territoriality Issues in an Online Social Learning Portal pp. 1-17 Downloads
Mohd Anwar and Peter Brusilovsky
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees pp. 18-34 Downloads
Mohamed Amine Boudia, Reda Mohamed Hamou and Abdelmalek Amine
Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN pp. 35-51 Downloads
Mukesh Kumar and Kamlesh Dutta
A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes pp. 52-64 Downloads
Emmy Mugisha, Gongxuan Zhang, Maouadj Zine El Abidine and Mutangana Eugene

Volume 10, issue 4, 2016

Hybrid Intrusion Detection Framework for Ad hoc networks pp. 1-32 Downloads
Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi
A Framework for Protecting Users' Privacy in Cloud pp. 33-43 Downloads
Adesina S. Sodiya and Adegbuyi B.
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing pp. 44-57 Downloads
Azin Moradbeikie, Saied Abrishami and Hasan Abbasi
Accurate Classification Models for Distributed Mining of Privately Preserved Data pp. 58-73 Downloads
Sumana M. and Hareesha K.S.

Volume 10, issue 3, 2016

Threshold Secret Sharing Scheme for Compartmented Access Structures pp. 1-9 Downloads
P. Mohamed Fathimal and P. Arockia Jansi Rani
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method pp. 10-24 Downloads
Nilay R. Mistry, Binoj Koshy, Mohindersinh Dahiya, Chirag Chaudhary, Harshal Patel, Dhaval Parekh, Jaidip Kotak, Komal Nayi and Priyanka Badva
Preventing Identity Disclosure in Social Networks Using Intersected Node pp. 25-41 Downloads
Amardeep Singh, Divya Bansal and Sanjeev Sofat
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks pp. 42-66 Downloads
Erukala Suresh Babu, C. Nagaraju and M.H.M. Krishna Prasad
Metamorphic malware detection using opcode frequency rate and decision tree pp. 67-86 Downloads
Mahmood Fazlali, Peyman Khodamoradi, Farhad Mardukhi, Masoud Nosrati and Mohammad Mahdi Dehshibi

Volume 10, issue 2, 2016

A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI) pp. 1-10 Downloads
Aftab Ahmad
Are the Payments System and e-Banking in India Safer than in other SAARC Members? pp. 11-25 Downloads
Rituparna Das
Analysis of Existing Trust Based Routing Schemes Used in Wireless Network pp. 26-40 Downloads
Kajal S. Patel and Jagdish S. Shah
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level pp. 41-63 Downloads
Shaikha Alduaij, Zhiyuan Chen and Aryya Gangopadhyay

Volume 10, issue 1, 2016

Combination of Access Control and De-Identification for Privacy Preserving in Big Data pp. 1-27 Downloads
Amine Rahmani, Abdelmalek Amine and Reda Mohamed Hamou
The Compliance of IT Control and Governance: A Case of Macao Gaming Industry pp. 28-44 Downloads
Colin Lai, Hung-Lian Tang, J. Michael Tarn and Sock Chung
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining pp. 45-65 Downloads
Pawan R. Bhaladhare and Devesh C. Jinwala

Volume 9, issue 4, 2015

Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group pp. 1-19 Downloads
S. Selva Nidhyananthan, Prasad M. and Shantha Selva Kumari R.
A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM pp. 26-58 Downloads
Mohamed Amine Boudia, Reda Mohamed Hamou and Abdelmalek Amine
Secure Group Message Transfer Stegosystem pp. 59-76 Downloads
Mahinder Pal Singh Bhatia, Manjot Kaur Bhatia and Sunil Kumar Muttoo

Volume 9, issue 3, 2015

An Efficient, Anonymous and Unlinkable Incentives Scheme pp. 1-20 Downloads
Milica Milutinovic, Andreas Put and Bart De Decker
A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking pp. 21-40 Downloads
Rui Wang, Zhiyong Zhang, Lei Ju and Zhiping Jia
Signature Restoration for Enhancing Robustness of FPGA IP Designs pp. 41-56 Downloads
Jing Long, Dafang Zhang, Wei Liang and Xia'an Bi
Authentication in Ubiquitous Networking pp. 57-83 Downloads
Abdullah Mohammed Almuhaideb and Bala Srinivasan
Software Defined Intelligent Building pp. 84-99 Downloads
Rui Yang Xu, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu and Zheng Yan

Volume 9, issue 2, 2015

Several Oblivious Transfer Variants in Cut-and-Choose Scenario pp. 1-12 Downloads
Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei and Hao Wang
Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective pp. 13-30 Downloads
Aminu Bello Usman, William Liu, Quan Bai and Ajit Narayanan
Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks pp. 31-59 Downloads
Weidong Yang, Liming Sun and Zhenqiang Xu
Observations on Genderwise Differences among University Students in Information Security Awareness pp. 60-74 Downloads
Ali Farooq, Johanna Isoaho, Seppo Virtanen and Jouni Isoaho

Volume 9, issue 1, 2015

Client-Side Detection of Clickjacking Attacks pp. 1-25 Downloads
Hossain Shahriar and Hisham M. Haddad
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour pp. 26-46 Downloads
Teodor Sommestad, Henrik Karlzén and Jonas Hallberg
Short Online/Off-line Signature Scheme for Wireless Sensor Networks pp. 47-61 Downloads
Anser Ghazzaal Ali Alquraishee, Jayaprakash Kar and Naomie Salim
Disassociations in Security Policy Lifecycles pp. 62-77 Downloads
Michael Lapke and Gurpreet Dhillon

Volume 8, issue 4, 2014

A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System pp. 1-25 Downloads
Chikh Ramdane and Salim Chikhi
Toward Proactive Mobile Tracking Management pp. 26-43 Downloads
Hella Kaffel Ben Ayed and Asma Hamed
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems pp. 44-61 Downloads
Amr Ali-Eldin, Jan Van Den Berg and Semir Daskapan
A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks pp. 62-102 Downloads
Piotr Książak, William Farrelly and Kevin Curran

Volume 8, issue 3, 2014

Users' Perception of Security for Mobile Communication Technology pp. 1-12 Downloads
Mohanad Halaweh
A New Fuzzy-Based Approach for Anonymity Quantification in E-Services pp. 13-38 Downloads
Wiem Hammami, Ilhem Souissi and Lamjed Ben Said
Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment pp. 39-62 Downloads
Janakiramaiah Bonam and Ramamohan Reddy
TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems pp. 63-76 Downloads
Xiaojun Wang and Brendan Cronin

Volume 8, issue 2, 2014

A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks pp. 1-18 Downloads
M. Poongodi and S. Bose
Classification of DOS Attacks Using Visualization Technique pp. 19-32 Downloads
Mohamed Cheikh, Salima Hacini and Zizette Boufaida
Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study pp. 33-54 Downloads
Xiang Fang and Sooun Lee
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution pp. 55-68 Downloads
Vinay Kumar, Abhishek Bansal and Sunil Kumar Muttoo

Volume 8, issue 1, 2014

Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective pp. 1-18 Downloads
Mathew Nicho and Shafaq Khan
A Covert Communication Model-Based on Image Steganography pp. 19-37 Downloads
Mamta Juneja
An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System pp. 38-61 Downloads
Prashanta Kumar Patra and Padma Lochan Pradhan
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks pp. 62-78 Downloads
Aymen Akremi, Hassen Sallay and Mohsen Rouached
Page updated 2017-10-29