International Journal of Security and Its Applications最新文献

筛选
英文 中文
Novel Approach for E-passport Authentication using Elgamal Cryptosystem 基于Elgamal密码系统的电子护照认证新方法
International Journal of Security and Its Applications Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.03
Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava
{"title":"Novel Approach for E-passport Authentication using Elgamal Cryptosystem","authors":"Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava","doi":"10.14257/IJSIA.2018.12.2.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"19-28"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43828571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Query-Dependency-Aware Location Privacy Protection for Road Networks 基于查询相关性的道路网络位置隐私保护
International Journal of Security and Its Applications Pub Date : 2018-03-31 DOI: 10.14257/ijsia.2018.12.2.04
Huiyun Chen, X. Qin
{"title":"Query-Dependency-Aware Location Privacy Protection for Road Networks","authors":"Huiyun Chen, X. Qin","doi":"10.14257/ijsia.2018.12.2.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.2.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"29-44"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46767341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A qualitative analysis of information privacy concerns among healthcare employees. 医疗保健员工信息隐私问题的定性分析。
International Journal of Security and Its Applications Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.06
Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy
{"title":"A qualitative analysis of information privacy concerns among healthcare employees.","authors":"Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy","doi":"10.14257/IJSIA.2018.12.1.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.06","url":null,"abstract":"Healthcare organizationsprocess massive amount of electronic medical records (EMR) utilizedby their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees’ concerns on privacy in the use of EMR. The purpose of this paper is to indicate the results from quantitative analysis (phase 1) through qualitative analysis (phase 2). From phase 1, privacy awareness is the only factor that influences information privacy concerns (IPC) in the use of EMRamong healthcare employees, suggesting that healthcare employees do not think that privacy policy, privacy control, privacy risk, and privacy experience influence their IPC. To investigate why the respondents answered in this manner, the interviewees were asked to clarify why they think privacy awareness is veryimportant to ensure the IPC among healthcare employees. Indeed, the mediating relationship of privacy awareness between privacy policy and IPC were discussed by highlighting on the implementation practices regarding privacy policy enforcement and awareness programs in healthcare organization.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"69-78"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48623959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cover Selection for More Secure Steganography 封面选择更安全的隐写
International Journal of Security and Its Applications Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.02
Reza Esfahani, Z. Norozi, G. Jandaghi
{"title":"Cover Selection for More Secure Steganography","authors":"Reza Esfahani, Z. Norozi, G. Jandaghi","doi":"10.14257/IJSIA.2018.12.1.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"21-36"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46327803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Identity-Based Cryptographic Approach for Vehicular Ah-hoc Networks 车载Ah-hoc网络的安全身份加密方法
International Journal of Security and Its Applications Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.05
S. Khan, F. Khan, Farheen Qazi, Dur-e-Shawar Agha, B. Das
{"title":"Secure Identity-Based Cryptographic Approach for Vehicular Ah-hoc Networks","authors":"S. Khan, F. Khan, Farheen Qazi, Dur-e-Shawar Agha, B. Das","doi":"10.14257/IJSIA.2018.12.1.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"59-68"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47000704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficiency of Two Versions of SNOW against Guess & Determine Attack 两种版本的SNOW对猜测和确定攻击的有效性
International Journal of Security and Its Applications Pub Date : 2018-01-31 DOI: 10.14257/ijsia.2018.12.1.04
M. Tahir, G. Mujtaba, Saood Zia, T. Naz
{"title":"Efficiency of Two Versions of SNOW against Guess & Determine Attack","authors":"M. Tahir, G. Mujtaba, Saood Zia, T. Naz","doi":"10.14257/ijsia.2018.12.1.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.1.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"47-58"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47147350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigation Strategies for Unintentional Insider Threats on Information Leaks 信息泄露意外内部威胁的缓解策略
International Journal of Security and Its Applications Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.03
W. Ismail, M. Yusof
{"title":"Mitigation Strategies for Unintentional Insider Threats on Information Leaks","authors":"W. Ismail, M. Yusof","doi":"10.14257/IJSIA.2018.12.1.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"37-46"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47769717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyber Defense Budget Assessment in Smart Grid Based on Reliability Evaluation Considering Practical Data of HV Substation 基于高压变电站实际数据可靠性评估的智能电网网络防御预算评估
International Journal of Security and Its Applications Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.01
N. Fardad, S. Soleymani, F. Faghihi
{"title":"Cyber Defense Budget Assessment in Smart Grid Based on Reliability Evaluation Considering Practical Data of HV Substation","authors":"N. Fardad, S. Soleymani, F. Faghihi","doi":"10.14257/IJSIA.2018.12.1.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.01","url":null,"abstract":"Communication and control in the smart grid without any disturbance is the primary task of High Voltage (HV) substation. The nature of electrical network obliges constructing and operating the functions of substations in remote areas far from urban centers. This can cause increasing of concerns about their security. Thus, HV substation designers have focused on defensive algorithms for decreasing these concerns. This paper deals with four cyber defense approaches, including hardware, software, communication shielded cable, and optimized cable route. The defense budget has been estimated via Fuzzy Analytic Hierarchy Process (FAHP) as a function of hardware, software, and communication shielded cable and optimized cable route. Knowledge and experience of experts help to extract mathematical relations between these four approaches. These relations are the base of optimization of attack and defense budget. In the proposed algorithm, \"loss of load expectation (LOLE)\" as a reliability index is utilized to optimize cyber defense budget of each part of studying network (one supervisory control and data acquisition (SCADA) center and nine HV substations). By comparing the LOLE with a permitted design threshold value, optimal budget of each item is determined. The accuracy of proposed methods has been validated by implementing to a case study real network.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"1-20"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.1.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44849068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Menger Curvature Based 3D Printing Watermarking Algorithm 基于门格尔曲率的3D打印水印算法
International Journal of Security and Its Applications Pub Date : 2017-12-31 DOI: 10.14257/ijsia.2017.11.12.06
Giao N. Pham, Suk-Hwan Lee, Eung-Joo Lee, Ki-Ryong Kwon
{"title":"Menger Curvature Based 3D Printing Watermarking Algorithm","authors":"Giao N. Pham, Suk-Hwan Lee, Eung-Joo Lee, Ki-Ryong Kwon","doi":"10.14257/ijsia.2017.11.12.06","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"65-78"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44804434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Trust in Cloud Computing: A Survey 云计算中的安全与信任:综述
International Journal of Security and Its Applications Pub Date : 2017-12-31 DOI: 10.14257/IJSIA.2017.11.12.01
Fatmeh Sedaghat, M. Haghparast, Mehrdad Maeen
{"title":"Security and Trust in Cloud Computing: A Survey","authors":"Fatmeh Sedaghat, M. Haghparast, Mehrdad Maeen","doi":"10.14257/IJSIA.2017.11.12.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41694352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信