Journal of Information Assurance and Security
Volume 4, Issue 6



Special Issue on Information Assurance and Data Security (Editorial)

Guest Editor: Massimiliano Rak, Dipartimento di Ingegneria dell'Informazione, Second University of Naples, Italy

 

 

 

Page no.



Bidirectional Secret Communication by Quantum Collisions

466

 Fabio Antonio Bovino

 

 

 


A Watermarking Technique based on Visual Cryptography  (short paper)

470

   B. Surekha, G.N. Swamy, K. Srinivasa Rao and A. Ravi Kumar

 

 

 

 

 


Adapting and accelerating the Stream Cipher Algorithm "RC4" using "Ultra Gridsec" and "HIMAN" and use it to secure "HIMAN" Data

474

  Hisham A. Kholidy and  Khaled S. Alghathbar

 

 

 

 

 


Enhancing File Data Security in Linux Operating System by Integrating Secure File System

484

  Rajesh Kumar Pal and Indranil Sengupta

 

 

 

 

 


Challenges for Security Typed Web Scripting Languages Design

493

  Doaa Hassan, Sherif El- Kassas and Ibrahim Ziedan

 

 

 


Security Issues in Drinking Water Distribution Networks

500

 Demetrios G. Eliades, Marios M. Polycarpou and Bambos Charalambous

 

 

 


Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method

509

 Klimis Ntalianis, Paraskevi Tzouveli, Stefanos Kollias and Athanasios Drigas

 

 

 

Security Requirements in Judicial Information Systems: Experience from a European Project for Judicial Cross-Border Collaboration

519

  George Eleftherakis, Konstantinos Rousis, Mauro Cislaghi, Roberto Mazzilli and    Sara Ferri

 

 

 

 

 

Secure Communication for Hierarchical Groups

530

  Sigurd Eskeland and Vladimir Oleshchuk

 

 

 

 

 

Time Domain Performances Analysis of Underwater Magnetic SIMAN Systems for Port Protection

538

  Osvaldo Faggioni, Maurizio Soldani, Davide Leoncini, Amleto Gabellone and Paolo   V. Maggiani

 

 

 

 

 

 

 

The Pushdown Attack and Attacking the Substitution Cipher Chaining mode (SCC)

546

  Mohamed Abo El-Fotouh and Klaus Diepold

 

 

 

 

 

Usability Evaluation of Identity Management Schemes in Three Virtual Organization Architectures

560

  Ali E. Abdallah, Ali N. Haidar

 

 

 

Regular Papers

 

 

 

Loss of Self-Similarity Detection Using Exact and Asymptotic Self-Similarity Models

571

  Mohd Fo’ad Rohani, Mohd Aizaini Maarof, Ali Selamat and Houssain Kettani

 

 

 


FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks

582

  Devesh Jinwala, Dhiren Patel and Kankar Dasgupta

 

 

 

Statistical anomaly detection on real e-mail traffic

604

  Maurizio Aiello, Davide Chiarella and Gianluca Papaleo

 

 

 

Protecting Digital Copyright in the Internet

612

  Franco Frattolillo and Federica Landolfi

 

 

 

A JPEG-Compliant Method for Image Authentication and Recovery

622

 Chiang-Lung Liu

 

 

 

A model with applications for data survivability in Critical Infrastructures

629

 MicheleAlbano, StefanoChessa and Roberto Di Pietro

 

 

 

Automatic Verification of Firewall Configurations with respect to Security Policy Requirements

640

 Soutaro Matsumoto and Adel Bouhoula

 

 

 

Copyright © 2005 - 2009, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.