International Journal of Information and Computer Security
2015 Vol.7 No.1
Pages | Title and author(s) |
1-13 | Mobile device securityKevin Curran; Vivian Maynes; Declan Harkin DOI: 10.1504/IJICS.2015.069205 |
14-38 | Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemesHaixia Xu; Bao Li; Qixiang Mei DOI: 10.1504/IJICS.2015.069211 |
39-48 | Advanced security analysis of a signature scheme with message recoveryLei Niu; Changqing Zhang; Qi Xia; Yong Yu DOI: 10.1504/IJICS.2015.069212 |
49-63 | Performance analysis of buffered crossbar switch scheduling algorithmsNarayanan Prasanth; Kannan Balasubramanian DOI: 10.1504/IJICS.2015.069208 |
64-90 | Implementing generic security requirements in e-voting using modified stegano-cryptographic approachOlayemi M. Olaniyi; Oladiran T. Arulogun; Oluwasayo E. Omidiora; Oladotun O. Okediran DOI: 10.1504/IJICS.2015.069214 |