Previous Issue (Vol. 2, No. 3), 2013
![]() |
ASSESSING DATABASE AND NETWORK THREATS IN TRADITIONAL AND CLOUD COMPUTINGAuthor/s: Katerina Lourida, Antonis Mouhtaropoulos, Alex Vakaloudis Pages: 1-17 |
![]() |
An Authentication Middleware for Prevention of Information TheftAuthor/s: S. Kami Makki, Md. Sadekur Rahman Pages: 18-26 |
![]() |
The Improved 32nd-Order Differential Attack on 8 Rounds of MISTY2 without FL FunctionsAuthor/s: Yasutaka Igarashi, Toshinobu Kaneko, Yutaka Eguchi, Takahiro Murai, Ryutaro Pages: 27-34 |