Facet browsing currently unavailable
Page 2 of 933 results
Sort by: relevance publication year
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy JOURNAL ARTICLE published April 2019 in International Journal of Information Security Research funded by National Natural Science Foundation of China (U1405251) |
Randomized gossip algorithms under attack JOURNAL ARTICLE published August 2014 in International Journal of Information Security |
A shuffle to achieve high efficiency through pre-computation and batch verification JOURNAL ARTICLE published August 2013 in International Journal of Information Security |
Provably secure E-cash system with practical and efficient complete tracing JOURNAL ARTICLE published June 2014 in International Journal of Information Security |
A distributed digital rights management model for secure information-distribution systems JOURNAL ARTICLE published November 2004 in International Journal of Information Security |
Password-authenticated key exchange based on RSA JOURNAL ARTICLE published December 2010 in International Journal of Information Security |
On hash functions using checksums JOURNAL ARTICLE published April 2010 in International Journal of Information Security |
Efficient identity-based GQ multisignatures JOURNAL ARTICLE published June 2009 in International Journal of Information Security |
Enhancing host security using external environment sensors JOURNAL ARTICLE published October 2011 in International Journal of Information Security |
Hiding information against structural re-identification JOURNAL ARTICLE published April 2019 in International Journal of Information Security |
Towards safer information sharing in the cloud JOURNAL ARTICLE published August 2015 in International Journal of Information Security |
Improved yoking proof protocols for preserving anonymity JOURNAL ARTICLE published August 2018 in International Journal of Information Security Research funded by National Research Foundation of Korea (2015R1D1A1A01058928) |
JOURNAL ARTICLE published November 2002 in International Journal of Information Security |
Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR JOURNAL ARTICLE published January 2008 in International Journal of Information Security |
Trusted mobile model based on DTE technology JOURNAL ARTICLE published October 2015 in International Journal of Information Security |
Handling distributed authorization with delegation through answer set programming JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |
Efficient trace and revoke schemes JOURNAL ARTICLE published December 2010 in International Journal of Information Security |
A game-theoretic approach for integrity assurance in resource-bounded systems JOURNAL ARTICLE published April 2018 in International Journal of Information Security Research funded by National Science Foundation (CNS-1239166,CNS-1238959) |
Preface to the special issue on ISC 2003 JOURNAL ARTICLE published October 2005 in International Journal of Information Security |
Securing the controller area network with covert voltage channels JOURNAL ARTICLE published December 2021 in International Journal of Information Security Research funded by Romanian Ministry of Research and Innovation, CNCS-UEFISCDI (PN-III-P1-1.1-TE-2016-1317) |