Journal cover image

Browse issues


Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Information and Computer Security

2010 Vol. 4 No. 1

 

PagesTitle and authors
1-8Speeding up Euclid's GCD algorithm with no magnitude comparisons
Che Wun Chiou, Fu Hua Chou, Yun-Chi Yeh
DOI: 10.1504/IJICS.2010.031855

9-23A secure partition-based document image watermarking scheme
Shiyan Hu
DOI: 10.1504/IJICS.2010.031856

24-29Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection
Amit K. Awasthi
DOI: 10.1504/IJICS.2010.031857

30-51Honeypot detection in advanced botnet attacks
Ping Wang, Lei Wu, Ryan Cunningham, Cliff C. Zou
DOI: 10.1504/IJICS.2010.031858

52-75Semantics-aware security policy specification for the semantic web data
Li Qin, Vijayalakshmi Atluri
DOI: 10.1504/IJICS.2010.031859

76-97An integrated approach to network intrusion detection with block clustering analysis, generalised logistic regression and linear discriminant analysis
Zhanshan (Sam) Ma
DOI: 10.1504/IJICS.2010.031860