Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 933 results
Sort by: relevance publication year

Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy

JOURNAL ARTICLE published April 2019 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (U1405251)

Authors: Jian-Wu Zheng | Jing Zhao | Xin-Ping Guan

Randomized gossip algorithms under attack

JOURNAL ARTICLE published August 2014 in International Journal of Information Security

Authors: Mousa Mousazadeh | Behrouz Tork Ladani

A shuffle to achieve high efficiency through pre-computation and batch verification

JOURNAL ARTICLE published August 2013 in International Journal of Information Security

Authors: Kun Peng

Provably secure E-cash system with practical and efficient complete tracing

JOURNAL ARTICLE published June 2014 in International Journal of Information Security

Authors: Bin Lian | Gongliang Chen | Jianhua Li

A distributed digital rights management model for secure information-distribution systems

JOURNAL ARTICLE published November 2004 in International Journal of Information Security

Authors: Habtamu Abie | Pål Spilling | Bent Foyn

Password-authenticated key exchange based on RSA

JOURNAL ARTICLE published December 2010 in International Journal of Information Security

Authors: Philip MacKenzie | Sarvar Patel | Ram Swaminathan

On hash functions using checksums

JOURNAL ARTICLE published April 2010 in International Journal of Information Security

Authors: Praveen Gauravaram | John Kelsey | Lars R. Knudsen | Søren S. Thomsen

Efficient identity-based GQ multisignatures

JOURNAL ARTICLE published June 2009 in International Journal of Information Security

Authors: Lein Harn | Jian Ren | Changlu Lin

Enhancing host security using external environment sensors

JOURNAL ARTICLE published October 2011 in International Journal of Information Security

Authors: Ee-Chien Chang | Liming Lu | Yongzheng Wu | Roland H. C. Yap | Jie Yu

Hiding information against structural re-identification

JOURNAL ARTICLE published April 2019 in International Journal of Information Security

Authors: Gábor György Gulyás | Sándor Imre

Towards safer information sharing in the cloud

JOURNAL ARTICLE published August 2015 in International Journal of Information Security

Authors: Marco Casassa-Mont | Ilaria Matteucci | Marinella Petrocchi | Marco Luca Sbodio

Improved yoking proof protocols for preserving anonymity

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Research funded by National Research Foundation of Korea (2015R1D1A1A01058928)

Authors: HyoungMin Ham | JongHyup Lee | JooSeok Song

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: Yukio Itakura | Masaki Hashiyada | Toshio Nagashima | Shigeo Tsujii

Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR

JOURNAL ARTICLE published January 2008 in International Journal of Information Security

Authors: Michael Backes | Birgit Pfitzmann

Trusted mobile model based on DTE technology

JOURNAL ARTICLE published October 2015 in International Journal of Information Security

Authors: Tao Li | Aiqun Hu

Handling distributed authorization with delegation through answer set programming

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: Shujing Wang | Yan Zhang

Efficient trace and revoke schemes

JOURNAL ARTICLE published December 2010 in International Journal of Information Security

Authors: Moni Naor | Benny Pinkas

A game-theoretic approach for integrity assurance in resource-bounded systems

JOURNAL ARTICLE published April 2018 in International Journal of Information Security

Research funded by National Science Foundation (CNS-1239166,CNS-1238959)

Authors: Aron Laszka | Yevgeniy Vorobeychik | Xenofon Koutsoukos

Preface to the special issue on ISC 2003

JOURNAL ARTICLE published October 2005 in International Journal of Information Security

Authors: Colin Boyd | Wenbo Mao

Securing the controller area network with covert voltage channels

JOURNAL ARTICLE published December 2021 in International Journal of Information Security

Research funded by Romanian Ministry of Research and Innovation, CNCS-UEFISCDI (PN-III-P1-1.1-TE-2016-1317)

Authors: Pal-Stefan Murvay | Lucian Popa | Bogdan Groza