Log in
Log in

For authors, reviewers, editors and board members

Forgotten?
Help Sitemap
Inderscience Publishers - linking academia, business and industry through research
  • Home
  • For Authors
  • For Librarians
  • Orders
  • Inderscience Online
  • News
  1. International Journal of Information and Computer Security
  2. Published issues
  3. 2014 Vol.6 No.3
International Journal of Information and Computer Security (IJICS)

International Journal of Information and Computer Security

2014 Vol.6 No.3


Pages Title and author(s)
199-240Detecting malicious files using non-signature-based methods
P. Vinod; Vijay Laxmi; Manoj Singh Gaur; Grijesh Chauhan
DOI: 10.1504/IJICS.2014.066646
241-269SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network
Mohamed Amine Ferrag; Mehdi Nafa; Salim Ghanemi
DOI: 10.1504/IJICS.2014.066650
270-285Vulnerability distribution scoring for software product security assessment
Hassan Rasheed
DOI: 10.1504/IJICS.2014.066653
286-305Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem
A. Muthulakshmi; R. Anitha
DOI: 10.1504/IJICS.2014.066661

 

  • Sign up for new issue alerts
  • Subscribe/buy articles/issues
  • View sample articles
  • Latest issue contents as RSS feed
  • Forthcoming articles
  • Journal information in easy print format (PDF)
  • Publishing with Inderscience: ethical statement
  • Recommend to a librarian (PDF)
  • Feedback to Editor
  • Get permission to reproduce content
  • Find related journals
Keep up-to-date
  • BlogOur Blog
  • TwitterFollow us on Twitter
  • FacebookVisit us on Facebook
  • Our Newsletter (subscribe for free)
  • RSS Feeds
  • New issue alerts
Return to top
  • Contact us
  • About Inderscience
  • OAI Repository
  • Privacy and Cookies Statement
  • Terms and Conditions
  • Help
  • Sitemap
  • © Inderscience Enterprises Ltd.