International Journal of Information and Computer Security
2017 Vol.9 No.3
Pages | Title and author(s) |
157-179 | Accountable administration in operating systemsLei Zeng; Hui Chen; Yang Xiao DOI: 10.1504/IJICS.2017.085134 |
180-211 | Security engineering methods - in-depth analysisShruti Jaiswal; Daya Gupta DOI: 10.1504/IJICS.2017.085135 |
212-228 | Opportunistic key management in delay tolerant networksSofia Anna Menesidou; Vasilios Katos DOI: 10.1504/IJICS.2017.085136 |
229-249 | A standardised data acquisition process model for digital forensic investigationsReza Montasari DOI: 10.1504/IJICS.2017.085139 |
250-270 | Keyed hash function using Bernoulli shift mapP. Jhansi Rani; S. Durga Bhavani DOI: 10.1504/IJICS.2017.085141 |