IJISC
  • Indexed in

  • Latest News

    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
    June 29, 2017
    Volume 6, Issue 1 of IJISC – International Journal of Information Security and Cybercrime was published
    May 5, 2017
    IJISC was indexed in CEEOL (Central and Eastern European Online Library) database
  • --- More News ---
  • Popular Articles

  • Search results for "authentication"

    Public Key Infrastructures for Trust and Authentication in the IoT

    Author(s): NĂSTASE, Lavinia
    Posted in Volume 6, Issue 1, Year 2017

    A Fingerprint-Based Scheme for ATM User Authentication

    Author(s): IWASOKUN, Gabriel B.
    Posted in Volume 5, Issue 2, Year 2016

    LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN

    Author(s): VOICU, Mirel
    Posted in Volume 1, Issue 1, Year 2012

    Report on Cyber Security Alerts Processed by CERT-RO in 2015

    Author(s): CERT, RO
    Posted in Volume 5, Issue 1, Year 2016

    “Challenges and Strategies in Cybersecurity” Book Review

    Author(s): BACIVAROV, Ioan
    Posted in Reviews Section, Volume 4, Issue 2, Year 2015

    Interview with Dr. Ray GENOE

    Author(s): MIHAI, Ioan-Cosmin
    Posted in Interviews, Volume 4, Issue 1, Year 2015

    SECITC 2016 – International Conference on Information Technology and Communications Security

    Author(s): MIHAI, Ioan-Cosmin
    Posted in Reviews Section, Volume 5, Issue 1, Year 2016

    Journal Full Archive


    Editorial: The International Journal of Information Security and Cybercrime

    Author(s): BACIVAROV, Ioan
    Posted in Editorials, Volume 1, Issue 1, Year 2012

    Solutions for Network Traffic Security: VPN Through IPsec and PKI

    Author(s): PAULIȘ, Mihai-Alexandru
    Posted in Volume 6, Issue 2, Year 2017

    Security in Most Recent Generation of Mobile Telecommunication Networks – LTE

    Author(s): SEREȚEANU, Adriana
    Posted in Volume 2, Issue 1, Year 2013

    Security Problems in Sensor Network

    Author(s): SHARMA, Preeti; GUPTA, Gaurav
    Posted in Volume 5, Issue 1, Year 2016

    A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO

    Author(s): PASĂRE, Alice-Lavinia; CIUCHI, Costel; BOTAN, Cristian
    Posted in Volume 3, Issue 2, Year 2014