Journal of Internet Services and Information Security


Volume 4, Issue 2, May 2014 (BibTex)
Cyber Security Protections and Applications

Guest Editorial: Special Issue on Cyber Security Protections and Applications                                                          
Xiaofeng Chen and Willy Susilo

pp. 4-26 (DOI:10.22667/JISIS.2014.05.31.004)
Reconciling Malicious and Accidental Risk in Cyber Security
Wolter Pieters, Zofia Lukszo, Dina Had?iosmanovi?, and Jan van den Berg

pp. 27-37 (DOI:10.22667/JISIS.2014.05.31.027)
Dynamic Model for Anonymity Measurement Based on Information Entropy
Jun Ye, Yong Ding, Xing-zhong Xiong, and Shu-lin Wu

Fail-Safe Security Architecture to Prevent Privacy Leaks from E-commerce Servers
Hiroshi Fujinoki, Christopher A. Chelmecki, and David M. Henry

pp. 55-69 (DOI:10.22667/JISIS.2014.05.31.055)
DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android
Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, and Toshihiro Yamauchi

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme
Keying Li, Jianfeng Wang, Yinghui Zhang, and Hua Ma

[Goto Archives]