International Journal of Information and Computer Security
2010 Vol.4 No.1
Pages | Title and author(s) |
1-8 | Speeding up Euclid's GCD algorithm with no magnitude comparisonsChe Wun Chiou, Fu Hua Chou, Yun-Chi Yeh DOI: 10.1504/IJICS.2010.031855 |
9-23 | A secure partition-based document image watermarking schemeShiyan Hu DOI: 10.1504/IJICS.2010.031856 |
24-29 | Remarks on the security of the strong proxy signature scheme with proxy signer privacy protectionAmit K. Awasthi DOI: 10.1504/IJICS.2010.031857 |
30-51 | Honeypot detection in advanced botnet attacksPing Wang, Lei Wu, Ryan Cunningham, Cliff C. Zou DOI: 10.1504/IJICS.2010.031858 |
52-75 | Semantics-aware security policy specification for the semantic web dataLi Qin, Vijayalakshmi Atluri DOI: 10.1504/IJICS.2010.031859 |
76-97 | An integrated approach to network intrusion detection with block clustering analysis, generalised logistic regression and linear discriminant analysisZhanshan (Sam) Ma DOI: 10.1504/IJICS.2010.031860 |