+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 4, Issue 2, May 2014 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

pp. 1-3
Guest Editorial: Special Issue on Cyber Security Protections and Applications                                                          
Xiaofeng Chen and Willy Susilo
[pdf]

pp. 4-26
Reconciling Malicious and Accidental Risk in Cyber Security
Wolter Pieters, Zofia Lukszo, Dina Hadžiosmanović, and Jan van den Berg

pp. 27-37
Dynamic Model for Anonymity Measurement Based on Information Entropy
Jun Ye, Yong Ding, Xing-zhong Xiong, and Shu-lin Wu

pp. 38-54
Fail-Safe Security Architecture to Prevent Privacy Leaks from E-commerce Servers
Hiroshi Fujinoki, Christopher A. Chelmecki, and David M. Henry

pp. 55-69
DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android
Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, and Toshihiro Yamauchi

pp. 70-82
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme
Keying Li, Jianfeng Wang, Yinghui Zhang, and Hua Ma

[Goto Archives]   

free templates