International Journal of Information and Computer Security
2017 Vol.9 No.4
Pages | Title and author(s) |
271-287 | Data hiding using lifting scheme and genetic algorithmGeeta Kasana; Kulbir Singh; Satvinder Singh Bhatia DOI: 10.1504/IJICS.2017.087561 |
288-301 | Update enabled multi-keyword searchable encryption scheme for secure data outsourcingVasudha Arora; S.S. Tyagi DOI: 10.1504/IJICS.2017.087562 |
302-323 | A novel quantum distributed key management protocol for ring-organised groupRima Djellab; Mohamed Benmohammed DOI: 10.1504/IJICS.2017.087563 |
324-336 | A trust-based approach for securing data communication in delay tolerant networksDjoudi Touazi; Mawloud Omar; Abdelhakim Bendib; Abdelmadjid Bouabdallah DOI: 10.1504/IJICS.2017.087564 |
337-360 | A survey on forensic event reconstruction systemsAbes Dabir; AbdelRahman M. Abdou; Ashraf Matrawy DOI: 10.1504/IJICS.2017.087565 |
361-386 | MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed networkK. Anusha; E. Sathiyamoorthy DOI: 10.1504/IJICS.2017.087567 |