Volume 5

November 2016, Volume 5, Number 4

Location Privacy Online : China, The Netherlands and South Korea
Peter Broeder1 and Yujin Lee2, 1Tilburg University, The Netherlands and 2Research Instruments, Falmouth, United Kingdom

A Wireless Fingerpring Attendance System
Pratima Patil, Ajit Khachane and Vijay Purohit, VIT - Mumbai, India

August 2016, Volume 5, Number 3

Controlling Information Flows During Software Development
Shih-Chien Chou, National Dong Hwa University, Taiwan

May 2016, Volume 5, Number 2

Dynamic Root of Trust and Challenges
Sandeep Romana, Himanshu Pareek and P R Lakshmi Eswari, Center for Development of Advanced Computing, India

February 2016, Volume 5, Number 1

The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First come, First-Served Source Address Validation
Improvement (FCFS SAVI)

Mohamed Lotfi Abderrahim and Mona Gharib, University of Dammam, Saudi Arabia

Using Lattice To Dynamically Prevent Information Leakage For Web Services
Shih-Chien Chou, National Dong Hwa University, Taiwan

Network Intrusion Detection And Countermeasure Selection In Virtual Network (NIDCS)
James D. Gadze, Maxwell Cobbah and Griffith S. Klogo, Kwame Nkrumah University of Science and Technology, Ghana

An Effective Semantic Encrypted Relational Data Using K-Nn Model
Subhashini Padma.M and Vanitha.P, Nandha Engineering College, India