Journal cover image

Browse issues


Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Information and Computer Security

2014 Vol. 6 No. 1

 

PagesTitle and authors
1-11Low power high throughput reconfigurable stream cipher hardware VLSI architectures
R. Sakthivel; M. Vanitha; Harish M. Kittur
DOI: 10.1504/IJICS.2014.059785

12-50Extracting the system call identifier from within VFS: a kernel stack parsing-based approach
Suvrojit Das; Debayan Chatterjee; D. Ghosh; Narayan C. Debnath
DOI: 10.1504/IJICS.2014.059786

51-62Genetic algorithms based data hiding scheme for digital images with LSBMR
P.M. Siva Raja; E. Baburaj
DOI: 10.1504/IJICS.2014.059787

63-92Context and semantics for detection of cyber attacks
Ahmed Aleroud; George Karabatis; Prayank Sharma; Peng He
DOI: 10.1504/IJICS.2014.059791

93-107Exposing WPA2 security protocol vulnerabilities
Achilleas Tsitroulis; Dimitris Lampoudis; Emmanuel Tsekleves
DOI: 10.1504/IJICS.2014.059797