International Journal of Information and Computer Security最新文献

筛选
英文 中文
Time-shared AES-128 implementation with extremely low-cost for smart card applications 分时AES-128实现,成本极低,适用于智能卡应用
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10042540
S. Rekha, P. Saravanan
{"title":"Time-shared AES-128 implementation with extremely low-cost for smart card applications","authors":"S. Rekha, P. Saravanan","doi":"10.1504/ijics.2021.10042540","DOIUrl":"https://doi.org/10.1504/ijics.2021.10042540","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced bitcoin with two-factor authentication 增强比特币与双因素认证
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10042543
Leyou Zhang, Ke Huang, F. Rezaeibagha, Yi Mu
{"title":"Enhanced bitcoin with two-factor authentication","authors":"Leyou Zhang, Ke Huang, F. Rezaeibagha, Yi Mu","doi":"10.1504/ijics.2021.10042543","DOIUrl":"https://doi.org/10.1504/ijics.2021.10042543","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effort Based Fault Detection and Correction Modeling for Multi Release of Software 基于努力的多版本软件故障检测与校正建模
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10033715
Javaid Iqbal, A. Shrivastava, I. Saraf
{"title":"Effort Based Fault Detection and Correction Modeling for Multi Release of Software","authors":"Javaid Iqbal, A. Shrivastava, I. Saraf","doi":"10.1504/ijics.2021.10033715","DOIUrl":"https://doi.org/10.1504/ijics.2021.10033715","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps 基于本体和模糊认知图的网络安全态势分层评估方法
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/IJICS.2021.10034834
Xin Li, Chengxiang Tan, Zhijie Fan
{"title":"A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps","authors":"Xin Li, Chengxiang Tan, Zhijie Fan","doi":"10.1504/IJICS.2021.10034834","DOIUrl":"https://doi.org/10.1504/IJICS.2021.10034834","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Session between IoT Device and Cloud Server based on Elliptic Curve Cryptosystem 基于椭圆曲线密码的物联网设备与云服务器安全会话
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/IJICS.2021.10037417
Jung-San Lee, Ngoc-Tu Huynh, Zhu-Dao Song, Y. Chen, Ting-Fang Cheng
{"title":"Secure Session between IoT Device and Cloud Server based on Elliptic Curve Cryptosystem","authors":"Jung-San Lee, Ngoc-Tu Huynh, Zhu-Dao Song, Y. Chen, Ting-Fang Cheng","doi":"10.1504/IJICS.2021.10037417","DOIUrl":"https://doi.org/10.1504/IJICS.2021.10037417","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"15 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for automatic malware analysis and classification: A Survey 恶意软件自动分析与分类方法综述
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10042590
Toni Grzinic, Eduardo Blazquez Gonzalez
{"title":"Methods for automatic malware analysis and classification: A Survey","authors":"Toni Grzinic, Eduardo Blazquez Gonzalez","doi":"10.1504/ijics.2021.10042590","DOIUrl":"https://doi.org/10.1504/ijics.2021.10042590","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-shared AES-128 implementation with extremely low-cost for smart card applications 分时AES-128实现,成本极低,适用于智能卡应用
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.118951
P. Saravanan, S. Rekha
{"title":"Time-shared AES-128 implementation with extremely low-cost for smart card applications","authors":"P. Saravanan, S. Rekha","doi":"10.1504/ijics.2021.118951","DOIUrl":"https://doi.org/10.1504/ijics.2021.118951","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced ant colony based AODV for analysis of black and gray hole attacks in MANET 基于改进蚁群AODV的自适应网络黑洞和灰洞攻击分析
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10034136
M. Bakhar, P. Bhande
{"title":"Enhanced ant colony based AODV for analysis of black and gray hole attacks in MANET","authors":"M. Bakhar, P. Bhande","doi":"10.1504/ijics.2021.10034136","DOIUrl":"https://doi.org/10.1504/ijics.2021.10034136","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Key Management Paradigm for Secure Wireless Ad Hoc Network Communications 安全无线自组织网络通信的动态密钥管理范式
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10029986
V. Venkaiah, A. Naidu, Ajeet Singh
{"title":"A Dynamic Key Management Paradigm for Secure Wireless Ad Hoc Network Communications","authors":"V. Venkaiah, A. Naidu, Ajeet Singh","doi":"10.1504/ijics.2021.10029986","DOIUrl":"https://doi.org/10.1504/ijics.2021.10029986","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of optimised protocol in MANET MANET中优化协议的性能评估
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/IJICS.2021.10037249
B. K. Pattanayak, Mamata Rath
{"title":"Performance evaluation of optimised protocol in MANET","authors":"B. K. Pattanayak, Mamata Rath","doi":"10.1504/IJICS.2021.10037249","DOIUrl":"https://doi.org/10.1504/IJICS.2021.10037249","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信