Facet browsing currently unavailable
Page 10 of 933 results
Sort by: relevance publication year
Cryptanalysis of the new TTS scheme in CHES 2004 JOURNAL ARTICLE published October 2006 in International Journal of Information Security |
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme JOURNAL ARTICLE published November 2015 in International Journal of Information Security |
Fully non-interactive onion routing with forward secrecy JOURNAL ARTICLE published February 2013 in International Journal of Information Security |
Special issue on the Security Track at the ACM Symposium on Applied Computing 2013 JOURNAL ARTICLE published April 2015 in International Journal of Information Security |
Editorial JOURNAL ARTICLE published August 2001 in International Journal of Information Security |
Fair multi-party non-repudiation protocols JOURNAL ARTICLE published July 2003 in International Journal of Information Security |
Wirelessly lockpicking a smart card reader JOURNAL ARTICLE published October 2014 in International Journal of Information Security |
Flowchart description of security primitives for controlled physical unclonable functions JOURNAL ARTICLE published October 2010 in International Journal of Information Security |
Generating visible RSA public keys for PKI JOURNAL ARTICLE published January 2004 in International Journal of Information Security |
Message from the guest editors JOURNAL ARTICLE published November 2016 in International Journal of Information Security |
On practical privacy-preserving fault-tolerant data aggregation JOURNAL ARTICLE published June 2019 in International Journal of Information Security Research funded by Polish National Science Center (2013/09/B/ST6/02258) |
Audit-based compliance control JOURNAL ARTICLE published March 2007 in International Journal of Information Security |
Defeating traffic analysis via differential privacy: a case study on streaming traffic JOURNAL ARTICLE published June 2022 in International Journal of Information Security Research funded by National Science Foundation (1801494,1718084) | National Science Foundation (1750809) | Army Research Laboratory (W911NF-17-1-0370) |
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware JOURNAL ARTICLE published February 2024 in International Journal of Information Security |
Enhancing attack resilience of cyber-physical systems through state dependency graph models JOURNAL ARTICLE published February 2024 in International Journal of Information Security |
A review on graph-based approaches for network security monitoring and botnet detection JOURNAL ARTICLE published February 2024 in International Journal of Information Security |
Risk balance defense approach against intrusions for network server JOURNAL ARTICLE published June 2014 in International Journal of Information Security |
Message from the Guest Editors JOURNAL ARTICLE published April 2016 in International Journal of Information Security |
Strong accumulators from collision-resistant hashing JOURNAL ARTICLE published October 2012 in International Journal of Information Security |
A personalized learning theory-based cyber-security training exercise JOURNAL ARTICLE published December 2023 in International Journal of Information Security |