International Journal of Internet Technology and Secured Transactions
2012 Vol.4 No.1
Pages | Title and author(s) |
1-11 | Secret image sharing with reversible capabilitiesGuzin Ulutas; Mustafa Ulutas; Vasif V. Nabiyev DOI: 10.1504/IJITST.2012.045160 |
12-25 | Differential power analysis: a serious threat for FPGA securityMassoud Masoumi DOI: 10.1504/IJITST.2012.045161 |
26-41 | Cultural and organisational commitment in the context of e-bankingIoannis V. Koskosas DOI: 10.1504/IJITST.2012.045147 |
42-54 | An effective spam filter based on a combined support vector machine approachMumtaz M. Al-Mukhtar; Yasmine M. Tabra DOI: 10.1504/IJITST.2012.045149 |
55-70 | Enforcing access control in workflow systems with a task engineering approachHamid Hatim; Hanan El Bakkali; Ilham Berrada DOI: 10.1504/IJITST.2012.045150 |
71-103 | A new mobile payment system with formal verificationShaik Shakeel Ahamad; Siba K. Udgata; V.N. Sastry DOI: 10.1504/IJITST.2012.045153 |