International Journal of Information Security and Privacy (IJISP)
2007 - 2025
Current editor(s): Yassine Maleh From IGI Global Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 13, issue 4, 2019
- A Quantum Secure Entity Authentication Protocol Design for Network Security pp. 1-11

- Surjit Paul, Sanjay Kumar and Rajiv Ranjan Suman
- Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption pp. 12-27

- G. Sravan Kumar and A. Sri Krishna
- A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set pp. 28-52

- N. Syed Siraj Ahmed and Debi Prasanna Acharjya
- Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions pp. 53-67

- Ranu Gupta, Rahul Pachauri and Ashutosh K. Singh
- Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks pp. 68-88

- Asha Jyothi Ch and Narsimha G.
- An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps pp. 89-108

- Pankaj Kumar, Vishnu Sharma, Gaurav Sharma and Tarunpreet Bhatia
- A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks pp. 109-138

- Ismaila Adeniyi Kamil and Sunday Oyinlola Ogundoyin
Volume 13, issue 3, 2019
- An Intelligent Surveillance System Based on IoT for Internal Security of a Nation pp. 1-30

- Tarun Kumar and Dharmender Singh Kushwaha
- Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection pp. 31-47

- Alok Kumar Shukla and Pradeep Singh
- Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site pp. 48-59

- Abhishek Kumar Singh, Naresh Kumar Nagwani and Sudhakar Pandey
- A Priority Based Efficient Secure Framework for WBANs pp. 60-73

- Vinay Pathak
- A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks pp. 74-90

- Deepika Agrawal, Sudhakar Pandey and Veena Anand
- A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT pp. 91-105

- Anurag Shukla Shukla and Sarsij Tripathi
- Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce pp. 106-122

- Ashish Kumar Tripathi, Kapil Sharma and Manju Bala
Volume 13, issue 2, 2019
- Reversible Data Hiding Scheme for Video pp. 1-13

- T. Bhaskar and Madhu Oruganti
- An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments pp. 14-31

- Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza and Tanveer Khan
- Cyber Defense Maturity Levels and Threat Models for Smart Cities pp. 32-46

- Ali Amur Al Shidhani
- Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies pp. 47-66

- Martin Boldt and Kaavya Rekanar
- Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions pp. 67-85

- Marwan Majeed Nayyef and Ali Makki Sagheer
- A Mathematical Model of HMST Model on Malware Static Analysis pp. 86-103

- Satheesh Abimannan and Kumaravelu R.
- Privacy Preservation Based on Separation Sensitive Attributes for Cloud Computing pp. 104-119

- Feng Xu, Mingming Su and Yating Hou
Volume 13, issue 1, 2019
- Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm pp. 1-16

- Oshin Sharma and Hemraj Saini
- Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence pp. 17-29

- Yerra Shankar Rao, Prasant Kumar Nayak, Hemraj Saini and Tarini Charana Panda
- A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques pp. 30-45

- Pratiksha Gautam and Hemraj Saini
- Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET pp. 46-58

- Mamata Rath and Binod Kumar Pattanayak
- Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing pp. 59-69

- Pratiksha Gautam, Mohd. Dilshad Ansari and Surender Kumar Sharma
- Efficient Routing Protocol for Location Privacy Preserving in Internet of Things pp. 70-85

- Rajwinder Kaur, Karan Verma, Shelendra Kumar Jain and Nishtha Kesswani
- A Survey: Intrusion Detection Techniques for Internet of Things pp. 86-105

- Sarika Choudhary and Nishtha Kesswani
Volume 12, issue 4, 2018
- Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω) pp. 1-23

- Martin Konan and Wenyong Wang
- VuWaDB: A Vulnerability Workaround Database pp. 24-34

- Atefeh Khazaei, Mohammad Ghasemzadeh and Christoph Meinel
- Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking pp. 35-53

- Rohit M. Thanki and Komal Rajendrakumar Borisagar
- A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO) pp. 54-67

- Charifa Hanin, Fouzia Omary, Souad Elbernoussi, Khadija Achkoun and Bouchra Echandouri
- A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain pp. 68-81

- Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li and Jihong Liu
- An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards pp. 82-97

- Patryk Szewczyk, Krishnun Sansurooah and Patricia A. H. Williams
Volume 12, issue 3, 2018
- A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia pp. 1-15

- Noushin Ashrafi and Jean-Pierre Kuilboer
- SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm pp. 16-26

- Bouchra Echandouri, Fouzia Omary, Fatima Ezzahra Ziani and Anas Sadak
- Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem pp. 27-41

- Hridoy Jyoti Mahanta and Ajoy Kumar Khan
- A Literature Review on Image Encryption Techniques pp. 42-83

- S Geetha, P Punithavathi, A Magnus Infanteena and S Siva Sivatha Sindhu
- Blind Image Source Device Identification: Practicality and Challenges pp. 84-99

- Udaya Sameer Venkata and Ruchira Naskar
- Misuse of ‘Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data pp. 100-122

- Benjamin Stark, Heiko Gewald, Heinrich Lautenbacher, Ulrich Haase and Siegmar Ruff
- Association Rule Hiding in Privacy Preserving Data Mining pp. 141-163

- S. Vijayarani Mohan and Tamilarasi Angamuthu
Volume 12, issue 2, 2018
- Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis pp. 1-25

- Malay Kumar and Manu Vardhan
- Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN pp. 26-37

- Geetanjali Rathee and Hemraj Saini
- A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks pp. 38-45

- Jhum Swain, Binod Kumar Pattanayak and Bibudhendu Pati
- An Improvised Framework for Privacy Preservation in IoT pp. 46-63

- Muzzammil Hussain and Neha Kaliya
Volume 12, issue 1, 2018
- A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security pp. 1-12

- Ranjeet Kumar Singh and Dilip Kumar Shaw
- Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification pp. 13-28

- Gautam Kumar and Hemraj Saini
- CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET pp. 29-41

- Arun Malik and Babita Pandey
- Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN pp. 42-52

- Geetanjali Rathee and Hemraj Saini
- Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN pp. 53-62

- Gulshan Kumar, Rahul Saha, Mandeep Singh and Mritunjay Kumar Rai
- Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor pp. 63-73

- Rajeev Sobti and Geetha Ganesan
- A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation pp. 74-88

- Rajni Mohana
- Breaching Security of Full Round Tiny Encryption Algorithm pp. 89-98

- Puneet Kumar Kaushal and Rajeev Sobti
| |