International Journal of Information Privacy, Security and Integrity
2013 Vol.1 No.4
Pages | Title and author(s) |
299-311 | Triple DoS: DDoS defence and tracebackAlex Doyal; Justin Zhan DOI: 10.1504/IJIPSI.2013.058206 |
312-343 | A dynamic constant size attribute-based group signature scheme with attribute anonymitySyed Taqi Ali; B.B. Amberker DOI: 10.1504/IJIPSI.2013.058207 |
344-359 | An approach for risk assessment and mitigation in cognitive radio technologiesAndre' Abadie; Duminda Wijesekera DOI: 10.1504/IJIPSI.2013.058208 |
360-380 | ProvIntSec: a provenance cognition blueprint ensuring integrity and security for real life open source cloudAsif Imran; Alim Ul Gias; Rayhanur Rahman; Kazi Sakib DOI: 10.1504/IJIPSI.2013.058226 |
381-402 | High development cost and software piracy: a study of motivesMehdi Sagheb-Tehrani; Arbi Ghazarian DOI: 10.1504/IJIPSI.2013.058231 |