
International Journal of Internet Technology and Secured Transactions
2015 Vol.6 No.1
Pages | Title and author(s) |
1-8 | Secure software engineering requirements in cloud environment by using anticipating learning classifier systemWafa' Slaibi Alsharafat DOI: 10.1504/IJITST.2015.073914 |
9-24 | An experimental setup for practical differential electromagnetic and power analysis of AES cryptosystemMassoud Masoumi; Mohammad Hadi Rezayati; Weidong Shi DOI: 10.1504/IJITST.2015.073918 |
25-42 | Implementing the information access assistant service for an evaluation Kiswendsida Kisito Kaboré; Florence Sèdes; Oumarou Sié; André Peninou DOI: 10.1504/IJITST.2015.073919 |
43-63 | A secure and efficient user authentication scheme for the webYassine Sadqi; Ahmed Asimi; Younes Asimi DOI: 10.1504/IJITST.2015.073936 |
64-78 | Finding forensic evidence for several web attacksNataša Šuteva; Aleksandra Mileva; Mario Loleski DOI: 10.1504/IJITST.2015.073938 |