
International Journal of Information Privacy, Security and Integrity
2015 Vol.2 No.2
![]() |
Pages | Title and author(s) |
81-101 | Intrusion detection technique for black hole attack in mobile ad hoc networksSunil Kumar; Kamlesh Dutta DOI: 10.1504/IJIPSI.2015.075435 |
102-137 | Privacy architectures in social networks' state-of-the-art survey Mohammad Badiul Islam; Renato Iannella; Jason Watson; Shlomo Geva DOI: 10.1504/IJIPSI.2015.075438 |
138-158 | A graph-based cloak algorithm to preserve location privacy in location-based servicesP. Shanthi; S.R. Balasundaram DOI: 10.1504/IJIPSI.2015.075439 |
159-175 | Secured approach for authentication using threshold-based hierarchical visual cryptography Pallavi Vijay Chavan; Mohammad Atique DOI: 10.1504/IJIPSI.2015.075440 |