International Journal of Information and Computer Security
2014 Vol.6 No.1
Pages | Title and author(s) |
1-11 | Low power high throughput reconfigurable stream cipher hardware VLSI architecturesR. Sakthivel; M. Vanitha; Harish M. Kittur DOI: 10.1504/IJICS.2014.059785 |
12-50 | Extracting the system call identifier from within VFS: a kernel stack parsing-based approachSuvrojit Das; Debayan Chatterjee; D. Ghosh; Narayan C. Debnath DOI: 10.1504/IJICS.2014.059786 |
51-62 | Genetic algorithms based data hiding scheme for digital images with LSBMRP.M. Siva Raja; E. Baburaj DOI: 10.1504/IJICS.2014.059787 |
63-92 | Context and semantics for detection of cyber attacksAhmed Aleroud; George Karabatis; Prayank Sharma; Peng He DOI: 10.1504/IJICS.2014.059791 |
93-107 | Exposing WPA2 security protocol vulnerabilitiesAchilleas Tsitroulis; Dimitris Lampoudis; Emmanuel Tsekleves DOI: 10.1504/IJICS.2014.059797 |