
International Journal of Information and Computer Security
2012 Vol.5 No.1
Pages | Title and author(s) |
1-10 | Bandwidth efficient buyer-seller watermarking protocolZhongqiu Xu; Liangju Li; Haibo Gao DOI: 10.1504/IJICS.2012.051079 |
11-27 | Multiple password interference in graphical passwordsHaichang Gao; Licheng Ma; Wei Jia; Fei Ye DOI: 10.1504/IJICS.2012.051078 |
28-47 | Tampering resistant self recoverable watermarking method using error correction codesSachin Mehta; Vijayaraghavan Varadharajan; Rajarathnam Nallusamy DOI: 10.1504/IJICS.2012.051089 |
48-67 | PCIEF: a policy conflict identification and evaluation frameworkVimalathithan Subramanian; Remzi Seker; Srini Ramaswamy; Rathinasamy B. Lenin DOI: 10.1504/IJICS.2012.051090 |
68-76 | Securing pairing-based cryptography on smartcardsMustapha Hedabou DOI: 10.1504/IJICS.2012.051091 |