default search action
Journal of Information Security and Applications, Volume 22
Volume 22, June 2015
- Atilla Elçi, Mehmet A. Orgun, Alexander G. Chefranov, Manoj Singh Gaur:
Editorial: Special issue on security of information and networks. 1-2 - Wolter Pieters, Julian A. Padget, Francien Dechesne, Virginia Dignum, Huib Aldewereld:
Effectiveness of qualitative and quantitative security obligations. 3-16 - Yulong Fu, Ousmane Koné:
Model based security verification of protocol implementation. 17-27 - Mudassar Aslam, Christian Gehrmann, Mats Björkman:
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies. 28-39 - Jérôme Dossogne, Frédéric Lafitte:
Blinded additively homomorphic encryption schemes for self-tallying voting. 40-53 - Frédéric Lafitte, Olivier Markowitch, Dirk Van Heule:
SAT based analysis of LTE stream cipher ZUC. 54-65 - Parvez Faruki, Vijay Laxmi, Ammar Bharmal, Manoj Singh Gaur, Vijay Ganmoor:
AndroSimilar: Robust signature for detecting variants of Android malware. 66-80 - Maxim Anikeev, Felix C. Freiling, Johannes Götzfried, Tilo Müller:
Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM. 81-86 - Somayeh Taheri, Salke Hartung, Dieter Hogrefe:
Anonymous group-based routing in MANETs. 87-98 - Vijay Laxmi, Chhagan Lal, Manoj Singh Gaur, Deepanshu Mehta:
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. 99-112 - Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl:
Advanced social engineering attacks. 113-122
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.