Journal cover image

Browse issues


Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Information and Computer Security

2015 Vol. 7 No. 1

 

PagesTitle and authors
1-13Mobile device security
Kevin Curran; Vivian Maynes; Declan Harkin
DOI: 10.1504/IJICS.2015.069205

14-38Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes
Haixia Xu; Bao Li; Qixiang Mei
DOI: 10.1504/IJICS.2015.069211

39-48Advanced security analysis of a signature scheme with message recovery
Lei Niu; Changqing Zhang; Qi Xia; Yong Yu
DOI: 10.1504/IJICS.2015.069212

49-63Performance analysis of buffered crossbar switch scheduling algorithms
Narayanan Prasanth; Kannan Balasubramanian
DOI: 10.1504/IJICS.2015.069208

64-90Implementing generic security requirements in e-voting using modified stegano-cryptographic approach
Olayemi M. Olaniyi; Oladiran T. Arulogun; Oluwasayo E. Omidiora; Oladotun O. Okediran
DOI: 10.1504/IJICS.2015.069214