Proposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shift
An Automated Malware Detection System for Android Using Behavior-Based Analysis AMDA
2012 (Vol. 1, No. 4)
Trusted Document Signing Based on Use of Biometric (Face) Keys
Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)
Digital Forensic Trends and Future
A Framework for Good Corporate Governance and Organisational Learning – An Empirical Study
2012 (Vol. 1, No. 2)
A Detailed Strategy for Managing Corporation Cyber War Security
Finite Field Arithmetic Architecture Based on Cellular Array
A New ShiftColumn Transformation: An Enhancement of Rijndael Key Scheduling
Sophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advanced
Certificate Revocation Management in VANET
The Right to Consent and Control Personal Information Processing in Cyberspace
Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2
Security Measurement Based On GQM To Improve Application Security During Requirements Stage
Mitigating Man-In-The-Browser Attacks with Hardware-based Authentication Scheme
A Privacy-Preserving Approach for Collecting Evidence in Forensic Investigation
Automating the Generation of Fake Documents to Detect Network Intruders
On Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomies