Facet browsing currently unavailable
Page 10 of 933 results
Sort by: relevance publication year
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks JOURNAL ARTICLE published February 2024 in International Journal of Information Security |
Security assessment and improvement of smart grid NIKE protocol JOURNAL ARTICLE published February 2024 in International Journal of Information Security Research funded by National Natural Science Foundation of China (62162039,61762060) |
A comprehensive simulation tool for the analysis of password policies JOURNAL ARTICLE published August 2009 in International Journal of Information Security |
When time meets test JOURNAL ARTICLE published August 2018 in International Journal of Information Security |
Techniques for improving the security and manageability of IPsec policy JOURNAL ARTICLE published June 2005 in International Journal of Information Security |
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Locating collaborative attack targets based on physical invariants toward cyber-physical systems JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Vulnerability discovery based on source code patch commit mining: a systematic literature review JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
A deep learning approach based on multi-view consensus for SQL injection detection JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Message from the guest editors JOURNAL ARTICLE published February 2020 in International Journal of Information Security |
A multi-layer framework for puzzle-based denial-of-service defense JOURNAL ARTICLE published August 2008 in International Journal of Information Security |
Privacy-preserving authentication framework using bloom filter for secure vehicular communications JOURNAL ARTICLE published August 2016 in International Journal of Information Security |
Certificate revocation system implementation based on the Merkle hash tree JOURNAL ARTICLE published January 2004 in International Journal of Information Security |
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs JOURNAL ARTICLE published December 2009 in International Journal of Information Security |
A general and efficient countermeasure to relation attacks in mix-based e-voting JOURNAL ARTICLE published February 2011 in International Journal of Information Security |
Privacy-preserving authentication of trees and graphs JOURNAL ARTICLE published November 2013 in International Journal of Information Security |
Analysis of information leakage from encrypted Skype conversations JOURNAL ARTICLE published October 2010 in International Journal of Information Security |
Security in cloud computing JOURNAL ARTICLE published April 2014 in International Journal of Information Security |
Understanding the implemented access control policy of Android system services with slicing and extended static checking JOURNAL ARTICLE published August 2015 in International Journal of Information Security |
Structural analysis and detection of android botnets using machine learning techniques JOURNAL ARTICLE published April 2018 in International Journal of Information Security |