Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake |
Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis, University of Derby, Greece |
Volume : 11 volume number : 4 pdf |
A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map |
Ashraf Afifi, Taif University, Kingdom of Saudi Arabia |
Volume : 11 volume number : 4 pdf |
System Call Dependence Graph Based Behavior Decomposition of Android Applications |
Bin Zhao, JD.com Silicon Valley R&D Center, USA |
Volume : 11 volume number : 4 pdf |
A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique |
Manju Kumari1, Vipin Pawar2 and Pawan Kumar3, 1YMCA University of Science and Technology, India, 2Deenbandhu Chotu Ram University of Science and Technology, India and 3University of Delhi, India |
Volume : 11 volume number : 4 pdf |
Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related to the Medical Internet of Things (MIOT) |
George W. Jackson, Jr.1 and Shawon S. M. Rahman2, 1Capella University, USA and 2University of Hawaii-Hilo, USA |
Volume : 11 volume number : 4 pdf |
Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification |
Ashraf Afifi1 and E.A.Zanaty2, 1Taif University, Kingdom of Saudi Arabia and 2Sohag University, Egypt |
Volume : 11 volume number : 4 pdf |