IJISC
  • Indexed in

  • Latest News

    June 28, 2019
    Volume 8, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Articles that contain the tag "authentication"

    LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN

    Author(s): VOICU, Mirel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2012.01.02
    Pages: 19-25
    AbstractPlus | Quick view | Full article | Citations


    Security in Most Recent Generation of Mobile Telecommunication Networks – LTE

    Author(s): SEREȚEANU, Adriana
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.01.02
    Pages: 17-24
    AbstractPlus | Quick view | Full article | Citations


    A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO

    Author(s): PASĂRE, Alice-Lavinia; CIUCHI, Costel; BOTAN, Cristian
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Security Problems in Sensor Network

    Author(s): SHARMA, Preeti; GUPTA, Gaurav
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2016.01.06
    Pages: 69-74
    AbstractPlus | Quick view | Full article | Citations


    A Fingerprint-Based Scheme for ATM User Authentication

    Author(s): IWASOKUN, Gabriel B.
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.02.07
    Pages: 71-86
    AbstractPlus | Quick view | Full article | Citations


    Public Key Infrastructures for Trust and Authentication in the IoT

    Author(s): NĂSTASE, Lavinia
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.01.05
    Pages: 51-56
    AbstractPlus | Quick view | Full article | Citations


    Solutions for Network Traffic Security: VPN Through IPsec and PKI

    Author(s): PAULIȘ, Mihai-Alexandru
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2017.02.06
    Pages: 40-46
    AbstractPlus | Quick view | Full article | Citations