Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.10042540
S. Rekha, P. Saravanan
{"title":"Time-shared AES-128 implementation with extremely low-cost for smart card applications","authors":"S. Rekha, P. Saravanan","doi":"10.1504/ijics.2021.10042540","DOIUrl":"https://doi.org/10.1504/ijics.2021.10042540","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.10042543
Leyou Zhang, Ke Huang, F. Rezaeibagha, Yi Mu
{"title":"Enhanced bitcoin with two-factor authentication","authors":"Leyou Zhang, Ke Huang, F. Rezaeibagha, Yi Mu","doi":"10.1504/ijics.2021.10042543","DOIUrl":"https://doi.org/10.1504/ijics.2021.10042543","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.10033715
Javaid Iqbal, A. Shrivastava, I. Saraf
{"title":"Effort Based Fault Detection and Correction Modeling for Multi Release of Software","authors":"Javaid Iqbal, A. Shrivastava, I. Saraf","doi":"10.1504/ijics.2021.10033715","DOIUrl":"https://doi.org/10.1504/ijics.2021.10033715","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/IJICS.2021.10034834
Xin Li, Chengxiang Tan, Zhijie Fan
{"title":"A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps","authors":"Xin Li, Chengxiang Tan, Zhijie Fan","doi":"10.1504/IJICS.2021.10034834","DOIUrl":"https://doi.org/10.1504/IJICS.2021.10034834","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/IJICS.2021.10037417
Jung-San Lee, Ngoc-Tu Huynh, Zhu-Dao Song, Y. Chen, Ting-Fang Cheng
{"title":"Secure Session between IoT Device and Cloud Server based on Elliptic Curve Cryptosystem","authors":"Jung-San Lee, Ngoc-Tu Huynh, Zhu-Dao Song, Y. Chen, Ting-Fang Cheng","doi":"10.1504/IJICS.2021.10037417","DOIUrl":"https://doi.org/10.1504/IJICS.2021.10037417","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"15 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.10042590
Toni Grzinic, Eduardo Blazquez Gonzalez
{"title":"Methods for automatic malware analysis and classification: A Survey","authors":"Toni Grzinic, Eduardo Blazquez Gonzalez","doi":"10.1504/ijics.2021.10042590","DOIUrl":"https://doi.org/10.1504/ijics.2021.10042590","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.118951
P. Saravanan, S. Rekha
{"title":"Time-shared AES-128 implementation with extremely low-cost for smart card applications","authors":"P. Saravanan, S. Rekha","doi":"10.1504/ijics.2021.118951","DOIUrl":"https://doi.org/10.1504/ijics.2021.118951","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.10034136
M. Bakhar, P. Bhande
{"title":"Enhanced ant colony based AODV for analysis of black and gray hole attacks in MANET","authors":"M. Bakhar, P. Bhande","doi":"10.1504/ijics.2021.10034136","DOIUrl":"https://doi.org/10.1504/ijics.2021.10034136","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.10029986
V. Venkaiah, A. Naidu, Ajeet Singh
{"title":"A Dynamic Key Management Paradigm for Secure Wireless Ad Hoc Network Communications","authors":"V. Venkaiah, A. Naidu, Ajeet Singh","doi":"10.1504/ijics.2021.10029986","DOIUrl":"https://doi.org/10.1504/ijics.2021.10029986","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/IJICS.2021.10037249
B. K. Pattanayak, Mamata Rath
{"title":"Performance evaluation of optimised protocol in MANET","authors":"B. K. Pattanayak, Mamata Rath","doi":"10.1504/IJICS.2021.10037249","DOIUrl":"https://doi.org/10.1504/IJICS.2021.10037249","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}