Journal of Information Assurance and Security
Volume 4, Issue 6
Special Issue on Information Assurance and Data Security (Editorial)
Guest Editor: Massimiliano Rak, Dipartimento di Ingegneria dell'Informazione, Second University of Naples, Italy
|
|
|
Page no. |
Bidirectional Secret Communication by Quantum Collisions
|
466 |
Fabio Antonio Bovino |
|
|
|
A Watermarking Technique based on Visual Cryptography (short paper)
|
470 |
B. Surekha, G.N. Swamy, K. Srinivasa Rao and A. Ravi Kumar |
|
|
|
|
|
Adapting and accelerating the Stream Cipher Algorithm "RC4" using "Ultra Gridsec" and "HIMAN" and use it to secure "HIMAN" Data
|
474 |
Hisham A. Kholidy and Khaled S. Alghathbar |
|
|
|
|
|
Enhancing File Data Security in Linux Operating System by Integrating Secure File System
|
484 |
Rajesh Kumar Pal and Indranil Sengupta |
|
|
|
|
|
Challenges for Security Typed Web Scripting Languages Design
|
493 |
Doaa Hassan, Sherif El- Kassas and Ibrahim Ziedan |
|
|
|
Security Issues in Drinking Water Distribution Networks
|
500 |
Demetrios G. Eliades, Marios M. Polycarpou and Bambos Charalambous |
|
|
|
Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method
|
509 |
Klimis Ntalianis, Paraskevi Tzouveli, Stefanos Kollias and Athanasios Drigas |
|
|
|
Security Requirements in Judicial Information Systems: Experience from a European Project for Judicial Cross-Border Collaboration |
519 |
George Eleftherakis, Konstantinos Rousis, Mauro Cislaghi, Roberto Mazzilli and Sara Ferri |
|
|
|
|
|
Secure Communication for Hierarchical Groups |
530 |
Sigurd Eskeland and Vladimir Oleshchuk
|
|
|
|
|
|
Time Domain Performances Analysis of Underwater Magnetic SIMAN Systems for Port Protection |
538 |
Osvaldo Faggioni, Maurizio Soldani, Davide Leoncini, Amleto Gabellone and Paolo V. Maggiani |
|
|
|
|
|
|
|
The Pushdown Attack and Attacking the Substitution Cipher Chaining mode (SCC) |
546 |
Mohamed Abo El-Fotouh and Klaus Diepold |
|
|
|
|
|
Usability Evaluation of Identity Management Schemes in Three Virtual Organization Architectures |
560 |
Ali E. Abdallah, Ali N. Haidar |
|
|
|
Regular Papers |
|
|
|
Loss of Self-Similarity Detection Using Exact and Asymptotic Self-Similarity Models |
571 |
Mohd Fo’ad Rohani, Mohd Aizaini Maarof, Ali Selamat and Houssain Kettani |
|
|
|
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks
|
582 |
Devesh Jinwala, Dhiren Patel and Kankar Dasgupta |
|
|
|
Statistical anomaly detection on real e-mail traffic |
604 |
Maurizio Aiello, Davide Chiarella and Gianluca Papaleo |
|
|
|
Protecting Digital Copyright in the Internet |
612 |
Franco Frattolillo and Federica Landolfi |
|
|
|
A JPEG-Compliant Method for Image Authentication and Recovery |
622 |
Chiang-Lung Liu |
|
|
|
A model with applications for data survivability in Critical Infrastructures |
629 |
MicheleAlbano, StefanoChessa and Roberto Di Pietro |
|
|
|
Automatic Verification of Firewall Configurations with respect to Security Policy Requirements |
640 |
Soutaro Matsumoto and Adel Bouhoula |
|
|
|
Copyright © 2005 - 2009, Dynamic Publishers Inc., USA
No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.
|