Volume 4 Number 4 December 2013

    
An Identification and Evaluation of Information Security and Assurance Research Outlets

Michael Whitman, Humayun Zafar, Herbert Mattord

https://doi.org/

Abstract The purpose of this study is to identify and comparatively assess the quality of information security specific publishing venues. Past studies in information systems and computer science have shown that information security-focused research can be published in mainstream information systems- and computer science-centric periodicals; however no studies to date have been found that specifically compared venues focused primarily on information... Read More


Exploiting Asynchronous Invariance for Resistant Encrypted Watermark Embedded in Radon Field

Dhekra ESSAIDANI, Hassene SEDDIK, Ezzedine BEN BRAIEK

https://doi.org/

Abstract The rapid evolution of technology and its applications have created the need for new techniques for copyright protection and data owner identification. Many researches are proposed to establish a potential solution to protect the ownership rights. In the last years, various watermarking techniques have been proposed to protect digital data online. This work presents a watermarking approach based on Radon... Read More


Security Analysis of High Dimensional Chaotic-Based Cryptosystem via its Key Sensitivity Study

Sonia Hammami

https://doi.org/

Abstract Stabilization conditions are proposed in this paper leading to master and slave hyperchaotic systems synchronization. They are, essentially, based on the use of a new state feedback controller and of the aggregation techniques for stability study associated to the arrow form matrix for system description. Indeed, the synchronization property is considered as the main way guaranteeing the design of one... Read More


Providing Wireless Network Security by Joint Physical Security and Signcryption Scheme

Nasser Ramazani, Hammid Reza Dalili Oskoei, Bahram Vazirnejhad

https://doi.org/

Abstract In a wireless network whatever try to isolate network against eavesdroppers but always there is a leakage probability of information. On the other hand considering the weaknesses of cryptography algorithms and attacks performed against them, cryptography alone cannot guarantee the security of communications in a wireless network. The goal of this paper is to gather solutions for creating a secure... Read More