-------- Original-Nachricht --------
International Journal of Information and Computer Security (IJICS)
====================================================
Indexed by Scopus, Compendex (EI), Inspec, Scirus
http://www.inderscience.com/ijics/ http://www.icebnet.org/ijics/
====================================================
Volume 6 - Issue 1 - 2014
Table of Contents
1
Low power high throughput reconfigurable stream cipher hardware VLSI
architectures
R. Sakthivel, M. Vanitha and Harish M. Kittur
12
Extracting the system call identifier from within VFS: a kernel stack
parsing-based approach
Suvrojit Das, Debayan Chatterjee, D. Ghosh and Narayan C. Debnath
51
Genetic algorithms based data hiding scheme for digital images with
LSBMR
P.M. Siva Raja and E. Baburaj
63
Context and semantics for detection of cyber attacks
Ahmed Aleroud, George Karabatis, Prayank Sharma and Peng He
93
Exposing WPA2 security protocol vulnerabilities
Achilleas Tsitroulis, Dimitris Lampoudis and Emmanuel Tsekleves
_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org