default search action
Journal of Internet Services and Information Security, Volume 10
Volume 10, Number 1, February 2020
- Ilsun You:
Letter from the Editor-in-Chief. 1 - Bo-Yeon Sim, Dong-Guk Han:
A Study on the SCA Trends for Application to IoT Devices. 2-21 - Fulvio Valenza, Manuel Cheminod:
An Optimized Firewall Anomaly Resolution. 22-37 - David John Lemay, Ram B. Basnet, Tenzin Doleck:
Examining the Relationship between Threat and Coping Appraisal in Phishing Detection among College Students. 38-49 - Yangzhicheng Lu, Tomoyuki Ishida:
Implementation and Evaluation of a High-presence Interior Layout Simulation System using Mixed Reality. 50-63
Volume 10, Number 2, May 2020
- Hwankuk Kim:
5G core network security issues and attack classification from network protocol perspective. 1-15 - Lasse Herskind, Panagiota Katsikouli, Nicola Dragoni:
Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble. 16-34 - Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, Jia Yu:
Secure Computation Outsourcing for Inversion in Finite Field. 35-48 - Andrey Pavlenko, Nursultan Askarbekuly, Swati Megha, Manuel Mazzara:
Micro-frontends: application of microservices to web front-ends. 49-66 - Sherifdeen Lawal, Ram Krishnan:
Policy Review in Attribute Based Access Control - A Policy Machine Case Study. 67-81 - Nguyen Canh Thang, Minho Park:
Detecting Malicious Middleboxes In Service Function Chaining. 82-90 - Francesco Colace, Massimo De Santo, Marco Lombardi, Rosalba Mosca, Domenico Santaniello:
A Multilayer Approach for Recommending Contextual Learning Paths. 91-102 - Yan Zhao, Ning Hu, Chi Zhang, Xinda Cheng:
DCG: A Client-side Protection Method for DNS Cache. 103-121
Volume 10, Number 3, August 2020
- Arinjita Paul, Lihua Wang, S. Sharmila Deva Selvi, C. Pandu Rangan:
Non-transferability in Proxy Re-Encryption Revisited. 1-30 - Samir Talegaon, Ram Krishnan:
Administrative Models for Role Based Access Control in Android. 31-46 - Morteza Alizadeh, Karl Andersson, Olov Schelén:
A Survey of Secure Internet of Things in Relation to Blockchain. 47-75 - Gabriele Baldi, Yair Diaz-Tellez, Theo Dimitrakos, Fabio Martinelli, Christina Michailidou, Paolo Mori, Oleksii Osliak, Andrea Saracino:
Session-dependent Usage Control for Big Data. 76-92 - Manipriya Sankaranarayanan, Mala Chelliah, Samson Mathew:
A Collaborative Framework for Traffic Information in Vehicular Adhoc Network Applications. 93-109 - Lukas König, Stefan Unger, Peter Kieseberg, Simon Tjoa:
The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks. 110-127
Volume 10, Number 4, November 2020
- Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions. 1-22 - Hiroaki Anada:
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs. 23-37 - Asem Kitana, Issa Traoré, Isaac Woungang:
Towards an Epidemic SMS-based Cellular Botnet. 38-58 - Shing Ki Wong, Siu-Ming Yiu:
Identification of device motion status via Bluetooth discovery. 59-69 - Muhammad Syafiq Mohd Pozi, Mohd. Hasbullah Omar:
A Kernel Density Estimation Method to Generate Synthetic Shifted Datasets in Privacy-Preserving Task. 70-89 - Myeongjoo Kang:
The Study on the Effect of the Internet and Mobile-Cellular on Trade in Services: Using the Modified Gravity Model. 90-100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.