
International Journal of Information and Computer Security
2026 Vol.29 No.2
| Pages | Title and author(s) |
| 113-134 | Preventing playback attacks in fingerprint biometrics through four-level hashingH. Mohamed Khan DOI: 10.1504/IJICS.2026.151306 |
| 135-175 | MIMO-cooperative-spectrum sensing with trust and reputation method in CRN on blockchain using Adam-gradient descent Archimedes algorithmSandip Babanrao Shrote; Sadhana D. Poshattiwar DOI: 10.1504/IJICS.2026.151305 |
| 176-206 | ReBIoT: a resource-efficient framework for blockchain-enabled IoT and distributed large-scale applicationsMuhammad Imran; Bin Yao DOI: 10.1504/IJICS.2026.151318 |
| 207-226 | Generalised multi-secret sharing scheme for non-monotone access structuresShiva Krishna Nallabothu; N. Rukma Rekha; Y.V. Subba Rao DOI: 10.1504/IJICS.2026.151307 |
| 227-247 | MTD-integrated ABAC: integrating moving target defence into attribute-based access control for insider threat mitigationOlusesi Balogun; Mohammad GhasemiGol; Zhipeng Cai; Daniel Takabi DOI: 10.1504/IJICS.2026.151315 |