Scientific Research An Academic Publisher
OPEN ACCESS
Journal of Information Security
Volume 3, Number 2, April 2012 (Special Issue on )
Cover Page, Table of Contents and Others: PDF (size: 2251KB)
A Fair Electronic Cash System with Identity-Based Group Signature Scheme ()
Khalid. O. Elaalim, Shoubao Yang
Journal of Information Security Vol.3 No.2, April 26, 2012
DOI: 10.4236/jis.2012.32021 3,967 Downloads 6,911 Views Citations This article belongs to the Special Issue on
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS ()
Ahmad Bakhtiyari Shahri, Zuraini Ismail
DOI: 10.4236/jis.2012.32020 7,536 Downloads 11,535 Views Citations This article belongs to the Special Issue on
Effect of Network Traffic on IPS Performance ()
Shahriar Mohammadi, Vahid Allahvakil, Mojtaba Khaghani
DOI: 10.4236/jis.2012.32019 5,520 Downloads 9,249 Views Citations This article belongs to the Special Issue on
Digital Image Watermarking Based on Mixed Error Correcting Code ()
Yonghong Chen, Jiancong Chen
DOI: 10.4236/jis.2012.32018 8,915 Downloads 13,372 Views Citations This article belongs to the Special Issue on
Detecting Threats of Acoustic Information Leakage Through Fiber Optic Communications ()
Vladimir V. Grishachev
DOI: 10.4236/jis.2012.32017 5,991 Downloads 9,814 Views Citations This article belongs to the Special Issue on
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks ()
Ming Tong, Tao Chen, Wei Zhang, Linna Dong
DOI: 10.4236/jis.2012.32016 4,384 Downloads 7,235 Views Citations This article belongs to the Special Issue on
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks ()
Sanjeev Kumar, Raja Sekhar Reddy Gade
DOI: 10.4236/jis.2012.32015 7,035 Downloads 12,371 Views Citations This article belongs to the Special Issue on
Digital Evidence for Database Tamper Detection ()
Shweta Tripathi, Bandu Baburao Meshram
DOI: 10.4236/jis.2012.32014 6,775 Downloads 11,816 Views Citations This article belongs to the Special Issue on
Privacy Preserving Scheme for Location-Based Services ()
Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib
DOI: 10.4236/jis.2012.32013 5,681 Downloads 11,133 Views Citations This article belongs to the Special Issue on
A Visual Cryptography Based Digital Image Copyright Protection ()
Adel Hammad Abusitta
DOI: 10.4236/jis.2012.32012 6,499 Downloads 11,736 Views Citations This article belongs to the Special Issue on
A Robust Method to Detect Hidden Data from Digital Images ()
Romany F. Mansour, W. F. Awwad, A. A. Mohammed
DOI: 10.4236/jis.2012.32011 9,813 Downloads 15,440 Views Citations This article belongs to the Special Issue on
Reference Encryption for Access Right Segregation and Domain Representation ()
Lanfranco Lopriore
DOI: 10.4236/jis.2012.32010 3,210 Downloads 5,481 Views Citations This article belongs to the Special Issue on
Determinants in Human Gait Recognition ()
Tahir Amin, Dimitrios Hatzinakos
DOI: 10.4236/jis.2012.32009 6,674 Downloads 10,799 Views Citations This article belongs to the Special Issue on
Hardware Performance Evaluation of SHA-3 Candidate Algorithms ()
Yaser Jararweh, Lo’ai Tawalbeh, Hala Tawalbeh, Abidalrahman Moh’d
DOI: 10.4236/jis.2012.32008 6,476 Downloads 10,725 Views Citations This article belongs to the Special Issue on
● Open Special Issues
● Published Special Issues
● Special Issues Guideline