International Journal of Information and Computer Security
2010 Vol.4 No.2
Pages | Title and author(s) |
99-117 | A systematic literature review of inference strategiesPhilip Woodall, Pearl Brereton DOI: 10.1504/IJICS.2010.034813 |
118-151 | A unified index structure for efficient enforcement of spatiotemporal authorisationsVijayalakshmi Atluri, Qi Guo, Heechang Shin, Jaideep Vaidya DOI: 10.1504/IJICS.2010.034814 |
152-163 | Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transferDefa Hu, Qiaoliang Li DOI: 10.1504/IJICS.2010.034815 |
164-197 | Comprehensive linguistic steganography surveyAbdelrahman Desoky DOI: 10.1504/IJICS.2010.034816 |