Journal of Information Assurance and Security

Volume 7, Issue 5, 2012
Cover Page

  Page no.
   
1 Changes in Guesswork over Time in Multi-processor Attacks
241
Reine Lundin and Stefan Lindskog
 
   
1Encryption Schemes from Williamson Matrices
252
Christos Koukouvinos and Dimitris E. Simos  
   
   
1 Key Initialization and Validation of Security Protocol Assumptions in a Home Health Care System
259
Kalvinder Singh, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
 
   
1An ID-based Beta Cryptosystem using Generalized Discrete Logarithm Problem and Integer Factorization Problem
275
Chandrashekhar Meshram, S.A.Meshram and Deepak Gupta  
   
   
1 TopologyAdaptiveComputation of Distributed IDS Set forDetectingAttacks on STP
284
Suchetana Chakraborty, Ferdous A Barbhuiya, Ankush Rai, Arijit Sur, Santosh Biswas and Sukumar Nandi
 
   
1A semantic based framework to identify and protect e-health critical resources
296
Flora Amato, Valentina Casola, Sara Romano and Antonino Mazzeo  
   
   
   

Copyright ©2005 - 2012, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.