Facet browsing currently unavailable
Page 1 of 934 results
Sort by: relevance publication year
Secure and efficient anonymization of distributed confidential databases JOURNAL ARTICLE published November 2014 in International Journal of Information Security |
Protocols useful on the Internet from distributed signature schemes JOURNAL ARTICLE published November 2004 in International Journal of Information Security |
JOURNAL ARTICLE published November 2002 in International Journal of Information Security |
Generic construction of an $$mathrm {eCK}$$ eCK -secure key exchange protocol in the standard model JOURNAL ARTICLE published October 2017 in International Journal of Information Security |
Preface JOURNAL ARTICLE published January 2008 in International Journal of Information Security |
Preface JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
KAMU: providing advanced user privacy in Kerberos multi-domain scenarios JOURNAL ARTICLE published November 2013 in International Journal of Information Security |
JOURNAL ARTICLE published November 2002 in International Journal of Information Security |
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
RAMA: a risk assessment solution for healthcare organizations JOURNAL ARTICLE published 1 March 2024 in International Journal of Information Security Research funded by Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) |
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks JOURNAL ARTICLE published June 2023 in International Journal of Information Security |
AAnA: Anonymous authentication and authorization based on short traceable signatures JOURNAL ARTICLE published October 2014 in International Journal of Information Security |
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture JOURNAL ARTICLE published April 2009 in International Journal of Information Security |
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network JOURNAL ARTICLE published 7 March 2024 in International Journal of Information Security |
On detecting co-resident cloud instances using network flow watermarking techniques JOURNAL ARTICLE published April 2014 in International Journal of Information Security |
Theory and benefits of recursive certificate structures JOURNAL ARTICLE published January 2004 in International Journal of Information Security |
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem JOURNAL ARTICLE published April 2013 in International Journal of Information Security |
A content-based deep intrusion detection system JOURNAL ARTICLE published June 2022 in International Journal of Information Security |
Efficient microaggregation techniques for large numerical data volumes JOURNAL ARTICLE published August 2012 in International Journal of Information Security |
Authenticating mobile phone users using keystroke analysis JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |