Menu
Home
Journals
Articles
Special Issues
Books
Conferences
News
Submit
Search
Login
E-alert
Journals A-Z
American Journal of Educational Research
International Journal of Celiac Disease
American Journal of Medical Case Reports
American Journal of Public Health Research
World Journal of Agricultural Research
Turkish Journal of Analysis and Number Theory
View all
All Subjects
Social Science
Medicine & Healthcare
Earth & Environmental
Agriculture & Food Sciences
Business, Management & Economics
Biomedical & Life Science
Mathematics & Physics
Engineering & Technology
Materials Science & Metallurgy
View all
Free Journals
Journal of Sociology and Anthropology
Journal of Linguistics and Literature
Nanoscience and Nanotechnology Research
Journal of Computer Networks
Applied Mathematics and Physics
American Journal of Sensor Technology
View all
sciepub.com
Quick Submission
Join Us
Apply for Editorial Position
Propose a special issue
Launch a new journal
Conference Application Form
Manuscript Tracking System
SciEP Reviewer Platform
Authors & Referees
Advertisers
Referees
Open Access
About
Information Security and Computer Fraud
ISSN (Print):
2376-9602
ISSN (Online):
2376-9629
Website:
https://www.sciepub.com/journal/iscf
Editor-in-chief:
Sergii Kavun
Open Access
Journal Browser
volume
Vol. 8, 2024
Vol. 7, 2019
Vol. 6, 2018
Vol. 5, 2017
Vol. 4, 2016
Vol. 3, 2015
Vol. 2, 2014
Vol. 1, 2013
issue
No. 1
No. 1
No. 1
No. 1
No. 1
No. 2
No. 1
No. 3
No. 2
No. 1
No. 1
Go
Submit an article to
ISCF
Propose a special issue
Join us as editorial board member
Journal Menu
Journal Menu
Aims & Scope
Editorial Board
Indexing & Abstracting
Instructions for Authors
Publication Ethics and Malpractice Statement
Plagiarism policy
Licence to publish
Copyright
Article workflow
Publication charges
News
For Referees
For Advertisers
For Librarians
FAQ
Contact us
Quick Submission
Toggle navigation
ISCF
Home
Current Issue
Archive
Articles
Citations
Most Read
The Top Artiles charts the articles that have been downloaded most often over the previous 30 days, in HTML, PDF, EPUB format, from the website. The chart does not rank the quality, scientific significance or citation impact of the content. However, it may bring articles to your attention that you might not have otherwise noticed. We hope you enjoy them.
Top Artiles
Open Access
Article
Top Artiles
Enhanced Anonymous Tag Based Credentials
by
Shinsuke Tamura
and
Shuji Taniguchi
Information Security and Computer Fraud
.
2014
, 2(1), 10-20. DOI: 10.12691/iscf-2-1-3
Pub. Date: March 17, 2014
Views: 23226
Downloads: 18686
Like:
37
information security
privacy
anonymous services
Abstract
Full Text PDF
(282 KB)
Full Text HTML
Full Text ePUB
(130 KB)
Open Access
Article
Top Artiles
A Scheme for Delegating Program Executions without Disclosing Secret Values
by
Shinsuke Tamura
and
Shuji Taniguchi
Information Security and Computer Fraud
.
2014
, 2(2), 21-27. DOI: 10.12691/iscf-2-2-1
Pub. Date: August 19, 2014
Views: 18316
Downloads: 13973
Like:
37
privacy
multidimensional array based encryption functions
order preserving encryption functions
tamper resistant programs
anonymous signature
Abstract
Full Text PDF
(211 KB)
Full Text HTML
Full Text ePUB
(59 KB)
Open Access
Article
Top Artiles
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
by
Chadi RIMAN
and
Pierre E. ABI-CHAR
Information Security and Computer Fraud
.
2015
, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 16, 2015
Views: 47917
Downloads: 41026
Like:
17
cryptography
DES
3DES
E-DES
AES
data encryption
decryption
Abstract
Full Text PDF
(202 KB)
Full Text HTML
Full Text ePUB
(309 KB)
Open Access
Article
Top Artiles
Novel Chaos Based Steganography for Images Using Matrix Encoding and Cat Mapping Techniques
by
V. Lokeswara Reddy
Information Security and Computer Fraud
.
2015
, 3(1), 8-14. DOI: 10.12691/iscf-3-1-2
Pub. Date: July 22, 2015
Views: 26096
Downloads: 24315
Like:
4
payload
chaotic cat mapping
matrix encoding
LSB Matching
Regions of Interests (ROI)
edge detection
image steganography
Abstract
Full Text PDF
(631 KB)
Full Text HTML
Full Text ePUB
(3574 KB)
Figure
4
of 11
Open Access
Article
Top Artiles
Investigation of Artefacts Left by BitTorrent Client in Windows 8 Registry
by
Algimantas Venčkauskas
,
Robertas Damaševičius
,
Nerijus Jusas
,
Vacius Jusas
,
Stasys Maciulevičius
,
Romas Marcinkevičius
,
Kęstutis Paulikas
and
Jevgenijus Toldinas
Information Security and Computer Fraud
.
2015
, 3(2), 25-31. DOI: 10.12691/iscf-3-2-1
Pub. Date: September 16, 2015
Views: 26760
Downloads: 24419
Like:
3
BitTorrent protocol
forensics investigation
forensic evidence
registry
Abstract
Full Text PDF
(332 KB)
Full Text HTML
Full Text ePUB
(542 KB)
Open Access
Article
Top Artiles
Assessment of E-Voting Risks Using AHP Method for the Omani Government Election
by
Faisal Al Amry
and
ChengJack Kie
Information Security and Computer Fraud
.
2016
, 4(1), 1-8. DOI: 10.12691/iscf-4-1-1
Pub. Date: January 28, 2016
Views: 28325
Downloads: 25713
Like:
5
risk
e-voting
risk management
parliamentary election
risk modelling
AHP
Ministry of Interior (MOI)
Abstract
Full Text PDF
(255 KB)
Full Text HTML
Full Text ePUB
(357 KB)
Manuscript template
Journal Services
Sign up for e-alerts
Recommend to library
Top Articles
Statistics
Rss feed
Special issues
Special issue guidelines
Propose special isssue