International Journal of Information and Computer Security
2016 Vol.8 No.4
Pages | Title and author(s) |
309-329 | Application of quantitative security measurement model for prioritisation of vulnerability mitigation: a real case studyAnshu Tripathi; Umesh Kumar Singh DOI: 10.1504/IJICS.2016.080423 |
330-346 | A robust zero watermarking algorithm for stereo audio signalsSunita V. Dhavale; Rajendra S. Deodhar; Debasish Pradhan; L.M. Patnaik DOI: 10.1504/IJICS.2016.080424 |
347-381 | A survey on security and efficiency issues in chaotic image encryptionJ. Gayathri; S. Subashini DOI: 10.1504/IJICS.2016.080427 |
382-400 | Towards service continuity for transactional applications via diverse device driversShengzhi Zhang; Xiaoqi Jia; Peng Liu DOI: 10.1504/IJICS.2016.080428 |