IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Articles that contain the tag "data encryption"

    LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN

    Author(s): VOICU, Mirel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2012.01.02
    Pages: 19-25
    AbstractPlus | Quick view | Full article | Citations


    Online Transactions Security in Internet Banking and e-Commerce

    Author(s): ILIE, Roxana-Corina
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.01.01
    Pages: 9-16
    AbstractPlus | Quick view | Full article | Citations


    Encryption in Mobile Communications. ZUC Algorithm.

    Author(s): IANCU, Laura; BACIVAROV, Ioan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack

    Author(s): GROSU, Vlad-Alexandru
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.02
    Pages: 19-26
    AbstractPlus | Quick view | Full article | Citations


    Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking

    Author(s): FIDA, Mohsin; JOVITH, A. Arokiaraj
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.01.07
    Pages: 75-80
    AbstractPlus | Quick view | Full article | Citations


    Hardware and Software Technologies used in the Financial Industry

    Author(s): PRICOPE, Ruxandra
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.01.03
    Pages: 33-40
    AbstractPlus | Quick view | Full article | Citations


    Public Key Infrastructures for Trust and Authentication in the IoT

    Author(s): NĂSTASE, Lavinia
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.01.05
    Pages: 51-56
    AbstractPlus | Quick view | Full article | Citations


    Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry

    Author(s): PASCARIU, Cristian; BARBU, Ionuț-Daniel; BACIVAROV, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.01.06
    Pages: 57-62
    AbstractPlus | Quick view | Full article | Citations


    Solutions for Network Traffic Security: VPN Through IPsec and PKI

    Author(s): PAULIȘ, Mihai-Alexandru
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2017.02.06
    Pages: 40-46
    AbstractPlus | Quick view | Full article | Citations


    Artificial Intelligence/Machine Learning Challenges and Evolution

    Author(s): ŞCHEAU, Mircea Constantin; ARSENE, Adrian Liviu; POPESCU, Gabriel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.01.01
    Pages: 11-22
    AbstractPlus | Quick view | Full article | Citations


    Security in Computer Networks

    Author(s): CERNOV, Ana-Maria
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2018.01.05
    Pages: 45-52
    AbstractPlus | Quick view | Full article | Citations


    Comparative Study of Cryptographic Algorithms

    Author(s): ABDULHAMID, Mohanad; GICHUKI, Nyagathu
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2019.01.01
    Pages: 13-22
    AbstractPlus | Quick view | Full article | Citations


    A Study on Password Strength in Wireless Encryption Protocols

    Author(s): PETRICĂ, Gabriel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2019.02.02
    Pages: 21-26
    AbstractPlus | Quick view | Full article | Citations


    Performance Evaluation of Selected Encryption Algorithms

    Author(s): ABIODUN, Ahmida; LAWAL, Olanrewaju; OYEBIYI, Oyediran; JOSEPH, Odiete; ADETORO, Adeyemi
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2021.02.03
    Pages: 21-30
    AbstractPlus | Quick view | Full article | Citations


    A Hybridized Honey Encryption for Data Security using Residue Number System

    Author(s): GIWA, Tawakalitu Afoluwaso; ABIODUN, Oludare Isaac; OMOLARA, Abiodun Esther; ISIAKA, Rafiu Mope
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2023.02.01
    Pages: 9-22
    AbstractPlus | Quick view | Full article | Citations