Printer Friendly

Articles from International Journal of Cyber-Security and Digital Forensics (July 1, 2012)

1-12 out of 12 article(s)
Title Author Type Words
A new shiftcolumn transformation: an enhancement of Rijndael key scheduling. Sulaiman, Salasiah; Muda, Zaiton; Juremi, Julia; Mahmod, Ramlan; Yasin, Sharifah Md. Report 2634
Amalgamation of cyclic bit operation in SD-EI image encryption method: an advanced version of SD-EI method: SD-EI ver-2. Dey, Somdip Report 2824
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? Azmi, Ida Madieha Abdul Ghani; Zulhuda, Sonny; Jarot, Sigit Puspito Wigati Report 5225
Efficient foreground extraction based on optical flow and SMED for road traffic analysis. SuganyaDevi, K.; Malmurugan, N.; Sivakumar, R. Report 4609
Enhancing advanced encryption standard S-box generation based on round key. Report 3231
Mitigating man-in-the-browser attacks with hardware-based authentication scheme. Nor, Fazli Bin Mat; Jalil, Kamarularifin Abd; Manan, Jamalul-lail Ab Report 4957
Runtime monitoring technique to handle tautology based SQL injection attacks. Dharam, Ramya; Shiva, Sajjan G. Report 6343
Security measurement based on GQM to improve application security during requirements stage. Abdulrazeg, Ala A.; Norwawi, Norita Md; Basir, Nurlida Report 4239
Sophistication techniques of fourth generations in neoteric mobile LTE and LTE-advanced. Yonis, A.Z.; Abdullah, M.F.L. Report 4226
The problem to consent to the collection, use, and disclosure of personal information in cyberspace. Rajaretnam, Thilla Report 4359
The right to consent and control personal information processing in cyberspace. Rajaretnam, Thilla Report 4686
Towards quantitative measures of information security: a cloud computing case study. Jouini, Mouna; Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Mili, Ali Report 6472

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters