International Journal of Internet Technology and Secured Transactions
2014 Vol.5 No.2
Pages | Title and author(s) |
105-116 | How loss profiles reveal behavioural biases in interdependent security decisionsAlan Nochenson; Jens Grossklags; C.F. Larry Heimann DOI: 10.1504/IJITST.2014.064511 |
117-132 | Framework for a secure digital identity management systemOpani Aweh; Stella Chinye Chiemeke DOI: 10.1504/IJITST.2014.064512 |
133-148 | Automation of the semantic annotation of web resourcesSahar Maâlej Dammak; Anis Jedidi; Rafik Bouaziz DOI: 10.1504/IJITST.2014.064513 |
149-162 | Secure multicast using IPSec and multi-party key computationAnand Mudgerikar; Manik Lal Das DOI: 10.1504/IJITST.2014.064514 |
163-189 | A patient privacy centric access control model for EHR systemsMario Sicuranza; Angelo Esposito; Mario Ciampi DOI: 10.1504/IJITST.2014.064515 |