Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 933 results
Sort by: relevance publication year

PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Muralidhara Rao Patruni | Abdul Gaffar Humayun

Security assessment and improvement of smart grid NIKE protocol

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (62162039,61762060)

Authors: Tao Feng | Wentao Jin | Minghu Zhang | Lu Zheng

A comprehensive simulation tool for the analysis of password policies

JOURNAL ARTICLE published August 2009 in International Journal of Information Security

Authors: Richard Shay | Elisa Bertino

When time meets test

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Authors: Jean-Louis Lanet | Hélène Le Bouder | Mohammed Benattou | Axel Legay

Techniques for improving the security and manageability of IPsec policy

JOURNAL ARTICLE published June 2005 in International Journal of Information Security

Authors: Jonathan Trostle | Bill Gossman

Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Muralidhara Rao Patruni | Abdul Gaffar Humayun

Locating collaborative attack targets based on physical invariants toward cyber-physical systems

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Peng Xun | Ziyu Yang | Haoyang Zhu | Zhu Tang

Vulnerability discovery based on source code patch commit mining: a systematic literature review

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Fei Zuo | Junghwan Rhee

A deep learning approach based on multi-view consensus for SQL injection detection

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Arzu Gorgulu Kakisim

Message from the guest editors

JOURNAL ARTICLE published February 2020 in International Journal of Information Security

Authors: Takeshi Takahashi | Rodrigo Roman Castro | Bilhanan Silverajan | Ryan K. L. Ko | Said Tabet

A multi-layer framework for puzzle-based denial-of-service defense

JOURNAL ARTICLE published August 2008 in International Journal of Information Security

Authors: XiaoFeng Wang | Michael K. Reiter

Privacy-preserving authentication framework using bloom filter for secure vehicular communications

JOURNAL ARTICLE published August 2016 in International Journal of Information Security

Authors: Avleen Malhi | Shalini Batra

Certificate revocation system implementation based on the Merkle hash tree

JOURNAL ARTICLE published January 2004 in International Journal of Information Security

Authors: Jose L. Muñoz | Jordi Forne | Oscar Esparza | Miguel Soriano

Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs

JOURNAL ARTICLE published December 2009 in International Journal of Information Security

Authors: Christian Hammer | Gregor Snelting

A general and efficient countermeasure to relation attacks in mix-based e-voting

JOURNAL ARTICLE published February 2011 in International Journal of Information Security

Authors: Kun Peng

Privacy-preserving authentication of trees and graphs

JOURNAL ARTICLE published November 2013 in International Journal of Information Security

Authors: Ashish Kundu | Elisa Bertino

Analysis of information leakage from encrypted Skype conversations

JOURNAL ARTICLE published October 2010 in International Journal of Information Security

Authors: Benoît Dupasquier | Stefan Burschka | Kieran McLaughlin | Sakir Sezer

Security in cloud computing

JOURNAL ARTICLE published April 2014 in International Journal of Information Security

Understanding the implemented access control policy of Android system services with slicing and extended static checking

JOURNAL ARTICLE published August 2015 in International Journal of Information Security

Authors: Tanveer Mustafa | Karsten Sohr

Structural analysis and detection of android botnets using machine learning techniques

JOURNAL ARTICLE published April 2018 in International Journal of Information Security

Authors: G. Kirubavathi | R. Anitha