You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

News Item Volume 14, Number 2
This is JISSec Volume 14, Number 2 launch announcement
Cart Item JISSec_V14N2_Alkharji_p83_CI
Genetic Algorithm-based Key Generation for Fully Homomorphic Encryption, by Majedah Alkharji, Mayyada Al Hammoshi, Chunqiang Hu and Hang Liu - Cart Item
Record V14N2_Alkharji.html
Cart Item JISSec_V14N2_Barnawi_p65_CI
A Hive Stream Encryption (HSE): A New Stream Encryption Algorithm, by Mahmoud Barnawi, Saad Alajmi and Bin Mai - Cart Item
Record V14N2_Barnawi.html
Cart Item JISSec_V14N2_Sabir_p49_CI
A Non-Algorithmic File-type Independent Method for Hiding Persistent Data in Files, by Maha F. Sabir, James H. Jones and Hang Liu - Cart Item
Record V14N2_Sabir.html
File V14N2_Editorial.pdf
JISSec Volume 14, Number 2 Editorial
File V14N2_FrontMatter.pdf
JISSec Volume 14, Number 2 Front Matter
Document V14N2.html
JISSec Volume 14, Number 2 (2018) contents
Folder N2
JISSec Volume 14, Number 2
News Item Volume 14, Number 1
This is JISSec Volume 14, Number 1 launch announcement
Cart Item JISSec_V14N1_Kavrestad_p31_CI
The Development of a Password Classification Model, by Joakim Kävrestad, Fredrik Eriksson and Marcus Nohlberg - Cart Item
Cart Item JISSec_V14N1_Duffany_p21_CI
Current Situation Analysis of Information Security Level in Municipalities, by Rose-Mharie Åhlfeldt, Marcus Nohlberg, Eva Söderström, Christian Lennerholt and ...
Document V14N1.html
JISSec Volume 14, Number 1 (2018) contents
Cart Item JISSec_V14N1_Ahlfeldt_p3_CI
Current Situation Analysis of Information Security Level in Municipalities, by Rose-Mharie Åhlfeldt, Marcus Nohlberg, Eva Söderström, Christian Lennerholt and ...
Record V14N1_Kavrestad.html
File V14N1_Editorial.pdf
JISSec Volume 14, Number 1 Editorial
File V14N1_FrontMatter.pdf
JISSec Volume 14, Number 1 Front Matter
Record V14N1_Duffany.html
Record V14N1_Ahlfeldt.html
Folder N1
JISSec Volume 14, Number 1
Folder V14
JISSec Volume 14 (2018)
Document V14.html
JISSec contents: Volume 14
News Item Volume 13, Number 3
This is JISSec Volume 13, Number 3 launch announcement
Cart Item JISSec_V13N3_Easttom_p175_CI
An Overview of Cryptographic Backdoors, by Chuck Easttom - Cart Item
Cart Item JISSec_V13N3_Chim_p151_CI
A Risk-based Layered Defence for Managing the Trusted Insider Threat, by Leung Chim, Daniel Bilusich, Steven Lord and Rick Nunes-Vaz - Cart Item
Cart Item JISSec_V13N3_Erigha_p135_CI
Intrusion Detection System based on Support Vector Machines and the Two-Phase Bat Algorithm, by Eseoghene Daniel Erigha, Femi Emmanuel Ayo, Oluwatobi Olakunle ...
File V13N3_Editorial.pdf
JISSec Volume 13, Number 3 Editorial
Record V13N3_Easttom.html