ISIJ 26: Cybersecurity Challenges and Responses

Editorial

Editorial. "Cybersecurity Challenges and Responses." Information & Security: An International Journal 26, no. 1 (2011): 5-6.

Reviewed articles

Láng, Judit. "Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept." Information & Security: An International Journal 26, no. 1 (2011): 7-11.
Sood, Sandeep K.. "Phishing Attacks: A Challenge Ahead." Information & Security: An International Journal 26, no. 1 (2011): 12-26.
Goel, Ajay, O.P.Sahu, Aman Soni, and Punit Soni. "A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images." Information & Security: An International Journal 26, no. 1 (2011): 27-33.
Mashhour, Ahmad, and Zakaria Saleh. "Evaluating Wireless Networks Security in Jordan: A Field Study." Information & Security: An International Journal 26, no. 1 (2011): 34-43.
Sharma, Ajay, and Deo Brat Ojha. "Biometric Template Security Using Code Base Cryptosystem." Information & Security: An International Journal 26, no. 2 (2013): 47-57.
Ali, Hesham Arafat. "A New Technique for Enhancing the Properties of Transmitted Data." Information & Security: An International Journal 26, no. 2 (2013): 58-78.
Kumar, Manoj, Mridul Kumar Gupta, and Saru Kumari. "A Robust Remote User Authentication Scheme using Smart Card." Information & Security: An International Journal 26, no. 2 (2013): 79-97.
Dehkordi, Massoud Hadian, and Reza Alimoradi. "Challenge-Response Schemes Using Gap Diffie-Hellman Groups." Information & Security: An International Journal 26, no. 2 (2013): 98-108.
Murugan, Sethu, and Dr.K.Kuppusamy. "Intelligent Intrusion Detection Prevention Systems." Information & Security: An International Journal 26, no. 2 (2013): 109-119.
Bhanwar, Shashi, and Seema Bawa. "TUX-TMS: A Reputation-based Trust System." Information & Security: An International Journal 26, no. 2 (2013): 120-131.
Share/Save