International Journal of Information and Computer Security
2019 Vol.11 No.6
Pages | Title and author(s) |
525-561 | Outsourcing computation for private function evaluationHenry Carter; Patrick Traynor DOI: 10.1504/IJICS.2019.103052 |
562-584 | PrivacyContext: identifying malicious mobile privacy leak using program contextXiaolei Wang; Yuexiang Yang DOI: 10.1504/IJICS.2019.103054 |
585-603 | Video watermarking scheme based on IDR frames using MPEG-2 structureRakesh Ahuja; Sarabjeet Singh Bedi DOI: 10.1504/IJICS.2019.103065 |
604-620 | Study on data fuzzy breakpoint detection in massive dynamic data flowMao Yingying; Yuan Hao DOI: 10.1504/IJICS.2019.103074 |
621-636 | A novel approach for query over encrypted data in databaseJaafer Al-Saraireh DOI: 10.1504/IJICS.2019.103083 |
637-662 | CB-ALCA: a cluster-based adaptive lightweight cryptographic algorithm for secure routing in wireless sensor networksM. Revanesh; V. Sridhar; John M. Acken DOI: 10.1504/IJICS.2019.103108 |