A Development of Management System for Malware Groups and Variants
DOI: 10.5176/2251-2233_ITS15
Authors: Hong-Koo Kang, Seung-Goo Ji and Hyun-Cheol Jeong
A Proposed Implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) in Global Smart Cards
DOI: 10.5176/978-981-08-7656-2_ITS20100-16
Authors: T. Abdurahmonov, Eng-Thiam Yeoh and Helmi Mohamed Hussain
A Study on Message Authentication Scheme Based on Efficient Group Signature in VANET
DOI: 10.5176/2251-2233_ITS12
Authors: Su-Hyun Kim, Im-Yeong Lee, Joung-Chul Ahn and Do-Hoon Lee
A Survey on the Security Requirements for a Successful Adoption of Digital Ecosystem Environment
DOI: 10.5176/2251-2233_ITS11
Authors: Ilung Pranata, Geoff Skinner and Rukshan Athauda
Botnet-Originated DDOS Attacks and their Mitigation: A new spiral in the arms race on the Internet
DOI: 10.5176/2251-2233_ITS10
Authors: William Beckett and Thusitha Jayawardena
Do you see or hear first: The case for perception simultaneity as a quality measure for multimodal biometric fusion
DOI: 10.5176/978-981-08-7656-2_ITS20100-13
Authors: Chiung Ching Ho and C.Eswaran
In secure SDLC we trust
DOI: 10.5176/978-981-08-7656-2 ITS20100-43
Authors: Mohamed Saifulamri Omar
IT Security Governance (ITSG) in Australian Context
DOI: 10.5176/978-981-08-7656-2_ITS20100-3
Authors: Tanveer A Zia and Zeeshan Ahmad
Updating…