Proposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shift
An Automated Malware Detection System for Android Using Behavior-Based Analysis AMDA
2012 (Vol. 1, No. 4)
Trusted Document Signing Based on Use of Biometric (Face) Keys
Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)
Digital Forensic Trends and Future
A Framework for Good Corporate Governance and Organisational Learning – An Empirical Study
2012 (Vol. 1, No. 2)
A Detailed Strategy for Managing Corporation Cyber War Security
Finite Field Arithmetic Architecture Based on Cellular Array
A New ShiftColumn Transformation: An Enhancement of Rijndael Key Scheduling
Sophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advanced
Certificate Revocation Management in VANET
The Right to Consent and Control Personal Information Processing in Cyberspace
Power Amount Analysis: An efficient Means to Reveal the Secrets in Cryptosystems
An AIS Inspired Alert Reduction Model
Runtime Monitoring Technique to handle Tautology based SQL Injection Attacks
Trust Measurements Yeld Distributed Decision Support in Cloud Computing
The Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspace
Modelling Based Approach for Reconstructing Evidence of VOIP Malicious Attacks