International Journal of Information and Computer Security
2020 Vol.13 No.2
Pages | Title and author(s) |
141-165 | Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big dataLija Mohan; Sudheep Elayidom M. DOI: 10.1504/IJICS.2020.108839 |
166-186 | Image encryption scheme based on a novel fractional order compound chaotic attractorJian-Feng Zhao; Shu-Ying Wang; Li-Tao Zhang; Xian-Feng Li DOI: 10.1504/IJICS.2020.108847 |
187-209 | Comparative evaluation of different classification techniques for masquerade attack detectionWisam Elmasry; Akhan Akbulut; Abdul Halim Zaim DOI: 10.1504/IJICS.2020.108848 |
210-226 | Mobile cloud computing applications penetration testing model designAhmad Salah Al-Ahmad; Syed Ahmad Aljunid; Normaly Kamal Ismail DOI: 10.1504/IJICS.2020.108849 |
227-248 | An authentication scheme for distributed computing environmentSaeed Ullah Jan; Fawad Qayum DOI: 10.1504/IJICS.2020.108858 |