Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 933 results
Sort by: relevance publication year

Cryptanalysis of the new TTS scheme in CHES 2004

JOURNAL ARTICLE published October 2006 in International Journal of Information Security

Authors: Jintai Ding | Dieter Schmidt | Zhijun Yin

Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme

JOURNAL ARTICLE published November 2015 in International Journal of Information Security

Authors: Thang Hoang | Deokjai Choi | Thuc Nguyen

Fully non-interactive onion routing with forward secrecy

JOURNAL ARTICLE published February 2013 in International Journal of Information Security

Authors: Dario Catalano | Mario Di Raimondo | Dario Fiore | Rosario Gennaro | Orazio Puglisi

Special issue on the Security Track at the ACM Symposium on Applied Computing 2013

JOURNAL ARTICLE published April 2015 in International Journal of Information Security

Authors: Giampaolo Bella | Helge Janicke

Editorial

JOURNAL ARTICLE published August 2001 in International Journal of Information Security

Authors: Dieter Gollman | Catherine A. Meadows | Eiji Okamoto

Fair multi-party non-repudiation protocols

JOURNAL ARTICLE published July 2003 in International Journal of Information Security

Authors: Steve Kremer | Olivier Markowitch

Wirelessly lockpicking a smart card reader

JOURNAL ARTICLE published October 2014 in International Journal of Information Security

Authors: Flavio D. Garcia | Gerhard de Koning Gans | Roel Verdult

Flowchart description of security primitives for controlled physical unclonable functions

JOURNAL ARTICLE published October 2010 in International Journal of Information Security

Authors: Boris Škorić | Marc X. Makkes

Generating visible RSA public keys for PKI

JOURNAL ARTICLE published January 2004 in International Journal of Information Security

Authors: C.S. Laih | K.Y. Chen

Message from the guest editors

JOURNAL ARTICLE published November 2016 in International Journal of Information Security

Authors: Liqun Chen | Chris Mitchell

On practical privacy-preserving fault-tolerant data aggregation

JOURNAL ARTICLE published June 2019 in International Journal of Information Security

Research funded by Polish National Science Center (2013/09/B/ST6/02258)

Authors: Krzysztof Grining | Marek Klonowski | Piotr Syga

Audit-based compliance control

JOURNAL ARTICLE published March 2007 in International Journal of Information Security

Authors: J. G. Cederquist | R. Corin | M. A. C. Dekker | S. Etalle | J. I. den Hartog | G. Lenzini

Defeating traffic analysis via differential privacy: a case study on streaming traffic

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Research funded by National Science Foundation (1801494,1718084) | National Science Foundation (1750809) | Army Research Laboratory (W911NF-17-1-0370)

Authors: Xiaokuan Zhang | Jihun Hamm | Michael K. Reiter | Yinqian Zhang

Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Silviu Viţel | Marilena Lupaşcu | Dragoş Teodor Gavriluţ | Henri Luchian

Enhancing attack resilience of cyber-physical systems through state dependency graph models

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Konstantinos Adamos | George Stergiopoulos | Michalis Karamousadakis | Dimitris Gritzalis

A review on graph-based approaches for network security monitoring and botnet detection

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Sofiane Lagraa | Martin Husák | Hamida Seba | Satyanarayana Vuppala | Radu State | Moussa Ouedraogo

Risk balance defense approach against intrusions for network server

JOURNAL ARTICLE published June 2014 in International Journal of Information Security

Authors: Chengpo Mu | Meng Yu | Yingjiu Li | Wanyu Zang

Message from the Guest Editors

JOURNAL ARTICLE published April 2016 in International Journal of Information Security

Authors: Guomin Yang | Willy Susilo | Yi Mu

Strong accumulators from collision-resistant hashing

JOURNAL ARTICLE published October 2012 in International Journal of Information Security

Authors: Philippe Camacho | Alejandro Hevia | Marcos Kiwi | Roberto Opazo

A personalized learning theory-based cyber-security training exercise

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Nabin Chowdhury | Vasileios Gkioulos