|
Journal of Information Security Research |
|
Current Issue |
|
|
Volume: 3 , Issue: 2 (June 2012) |
|
IT Architecture from the Service Continuity Perspective: Application of Well-Founded Ontology in Corporate Environments-
Hedwio Carvalho e Silva, Rita de Cassia C. de Castro, Marcos Jose Negreiros Gomes
Page: 47-63
Abstract | Full Text (PDF, 197KB)
|
Schnorr Digital Signature in Signcryption Scheme-
Laura Savu
Page: 64-73
Abstract | Full Text (PDF, 67KB)
|
High Complexity with Steganography in LSB and MSB-
Salam R. Mahdi, Yahia Najar, Mahmood Shaar
Page: 74-80
Abstract | Full Text (PDF, 39KB)
|
Natural Heuristics for Cryptanalysis-
T. Mekhaznia
Page: 81-88
Abstract | Full Text (PDF, 54KB)
|
Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks-
Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun
Page: 81-88
Abstract | Full Text (PDF, 102KB)
|
Book Review |
|
Conference Notification |
• The Fourth International Conference on the Networked Digital Technologies (NDT 2012)
• The Fifth International Conference on the Applications of Digital Information and Web Technologies
(ICADIWT 2012)
• Seventh International Conference on Digital Information Management (ICDIM 2012)
|