International Journal of Information and Computer Security
2024 Vol.23 No.2
Pages | Title and author(s) |
119-138 | A secure three-factor authentication protocol for mobile networksDevender Kumar; Satish Chand; Bijendra Kumar DOI: 10.1504/IJICS.2024.137716 |
139-162 | Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare systemRaja Sohail Ahmed; Yongli Wang; Irfan Ali Kandhro; Nabila Sehito; Ghulam Ali Mallah; Fayyaz Ali DOI: 10.1504/IJICS.2024.137717 |
163-189 | PBDG: a malicious code detection method based on precise behaviour dependency graphChenghua Tang; Mengmeng Yang; Qingze Gao; Baohua Qiang DOI: 10.1504/IJICS.2024.137719 |
190-199 | User driven general framework to cap the joins in secure group communicationPayal Sharma; B.R. Purushothama DOI: 10.1504/IJICS.2024.137722 |
200-226 | SLAK: secure lightweight scheme for authentication and key-agreement in internet of thingsOussama Nahnah; Sarra Cherbal DOI: 10.1504/IJICS.2024.137741 |