EconPapers    
Economics at your fingertips  
 

International Journal of Information Security and Privacy (IJISP)

2007 - 2025

Current editor(s): Yassine Maleh

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 13, issue 4, 2019

A Quantum Secure Entity Authentication Protocol Design for Network Security pp. 1-11 Downloads
Surjit Paul, Sanjay Kumar and Rajiv Ranjan Suman
Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption pp. 12-27 Downloads
G. Sravan Kumar and A. Sri Krishna
A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set pp. 28-52 Downloads
N. Syed Siraj Ahmed and Debi Prasanna Acharjya
Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions pp. 53-67 Downloads
Ranu Gupta, Rahul Pachauri and Ashutosh K. Singh
Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks pp. 68-88 Downloads
Asha Jyothi Ch and Narsimha G.
An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps pp. 89-108 Downloads
Pankaj Kumar, Vishnu Sharma, Gaurav Sharma and Tarunpreet Bhatia
A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks pp. 109-138 Downloads
Ismaila Adeniyi Kamil and Sunday Oyinlola Ogundoyin

Volume 13, issue 3, 2019

An Intelligent Surveillance System Based on IoT for Internal Security of a Nation pp. 1-30 Downloads
Tarun Kumar and Dharmender Singh Kushwaha
Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection pp. 31-47 Downloads
Alok Kumar Shukla and Pradeep Singh
Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site pp. 48-59 Downloads
Abhishek Kumar Singh, Naresh Kumar Nagwani and Sudhakar Pandey
A Priority Based Efficient Secure Framework for WBANs pp. 60-73 Downloads
Vinay Pathak
A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks pp. 74-90 Downloads
Deepika Agrawal, Sudhakar Pandey and Veena Anand
A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT pp. 91-105 Downloads
Anurag Shukla Shukla and Sarsij Tripathi
Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce pp. 106-122 Downloads
Ashish Kumar Tripathi, Kapil Sharma and Manju Bala

Volume 13, issue 2, 2019

Reversible Data Hiding Scheme for Video pp. 1-13 Downloads
T. Bhaskar and Madhu Oruganti
An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments pp. 14-31 Downloads
Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza and Tanveer Khan
Cyber Defense Maturity Levels and Threat Models for Smart Cities pp. 32-46 Downloads
Ali Amur Al Shidhani
Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies pp. 47-66 Downloads
Martin Boldt and Kaavya Rekanar
Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions pp. 67-85 Downloads
Marwan Majeed Nayyef and Ali Makki Sagheer
A Mathematical Model of HMST Model on Malware Static Analysis pp. 86-103 Downloads
Satheesh Abimannan and Kumaravelu R.
Privacy Preservation Based on Separation Sensitive Attributes for Cloud Computing pp. 104-119 Downloads
Feng Xu, Mingming Su and Yating Hou

Volume 13, issue 1, 2019

Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm pp. 1-16 Downloads
Oshin Sharma and Hemraj Saini
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence pp. 17-29 Downloads
Yerra Shankar Rao, Prasant Kumar Nayak, Hemraj Saini and Tarini Charana Panda
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques pp. 30-45 Downloads
Pratiksha Gautam and Hemraj Saini
Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET pp. 46-58 Downloads
Mamata Rath and Binod Kumar Pattanayak
Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing pp. 59-69 Downloads
Pratiksha Gautam, Mohd. Dilshad Ansari and Surender Kumar Sharma
Efficient Routing Protocol for Location Privacy Preserving in Internet of Things pp. 70-85 Downloads
Rajwinder Kaur, Karan Verma, Shelendra Kumar Jain and Nishtha Kesswani
A Survey: Intrusion Detection Techniques for Internet of Things pp. 86-105 Downloads
Sarika Choudhary and Nishtha Kesswani

Volume 12, issue 4, 2018

Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω) pp. 1-23 Downloads
Martin Konan and Wenyong Wang
VuWaDB: A Vulnerability Workaround Database pp. 24-34 Downloads
Atefeh Khazaei, Mohammad Ghasemzadeh and Christoph Meinel
Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking pp. 35-53 Downloads
Rohit M. Thanki and Komal Rajendrakumar Borisagar
A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO) pp. 54-67 Downloads
Charifa Hanin, Fouzia Omary, Souad Elbernoussi, Khadija Achkoun and Bouchra Echandouri
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain pp. 68-81 Downloads
Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li and Jihong Liu
An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards pp. 82-97 Downloads
Patryk Szewczyk, Krishnun Sansurooah and Patricia A. H. Williams

Volume 12, issue 3, 2018

A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia pp. 1-15 Downloads
Noushin Ashrafi and Jean-Pierre Kuilboer
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm pp. 16-26 Downloads
Bouchra Echandouri, Fouzia Omary, Fatima Ezzahra Ziani and Anas Sadak
Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem pp. 27-41 Downloads
Hridoy Jyoti Mahanta and Ajoy Kumar Khan
A Literature Review on Image Encryption Techniques pp. 42-83 Downloads
S Geetha, P Punithavathi, A Magnus Infanteena and S Siva Sivatha Sindhu
Blind Image Source Device Identification: Practicality and Challenges pp. 84-99 Downloads
Udaya Sameer Venkata and Ruchira Naskar
Misuse of ‘Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data pp. 100-122 Downloads
Benjamin Stark, Heiko Gewald, Heinrich Lautenbacher, Ulrich Haase and Siegmar Ruff
Association Rule Hiding in Privacy Preserving Data Mining pp. 141-163 Downloads
S. Vijayarani Mohan and Tamilarasi Angamuthu

Volume 12, issue 2, 2018

Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis pp. 1-25 Downloads
Malay Kumar and Manu Vardhan
Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN pp. 26-37 Downloads
Geetanjali Rathee and Hemraj Saini
A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks pp. 38-45 Downloads
Jhum Swain, Binod Kumar Pattanayak and Bibudhendu Pati
An Improvised Framework for Privacy Preservation in IoT pp. 46-63 Downloads
Muzzammil Hussain and Neha Kaliya

Volume 12, issue 1, 2018

A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security pp. 1-12 Downloads
Ranjeet Kumar Singh and Dilip Kumar Shaw
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification pp. 13-28 Downloads
Gautam Kumar and Hemraj Saini
CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET pp. 29-41 Downloads
Arun Malik and Babita Pandey
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN pp. 42-52 Downloads
Geetanjali Rathee and Hemraj Saini
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN pp. 53-62 Downloads
Gulshan Kumar, Rahul Saha, Mandeep Singh and Mritunjay Kumar Rai
Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor pp. 63-73 Downloads
Rajeev Sobti and Geetha Ganesan
A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation pp. 74-88 Downloads
Rajni Mohana
Breaching Security of Full Round Tiny Encryption Algorithm pp. 89-98 Downloads
Puneet Kumar Kaushal and Rajeev Sobti
Page updated 2025-04-17