Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 933 results
Sort by: relevance publication year

Randomized gossip algorithms under attack

JOURNAL ARTICLE published August 2014 in International Journal of Information Security

Authors: Mousa Mousazadeh | Behrouz Tork Ladani

A shuffle to achieve high efficiency through pre-computation and batch verification

JOURNAL ARTICLE published August 2013 in International Journal of Information Security

Authors: Kun Peng

Provably secure E-cash system with practical and efficient complete tracing

JOURNAL ARTICLE published June 2014 in International Journal of Information Security

Authors: Bin Lian | Gongliang Chen | Jianhua Li

A distributed digital rights management model for secure information-distribution systems

JOURNAL ARTICLE published November 2004 in International Journal of Information Security

Authors: Habtamu Abie | Pål Spilling | Bent Foyn

Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack

JOURNAL ARTICLE published 4 April 2024 in International Journal of Information Security

Authors: Joaquín Navajas-Adán | Eulàlia Badia-Gelabert | Laura Jiménez-Saurina | Mª Jesús Marijuán-Martín | Rafael Mayo-García

Toward a blockchain-based framework for challenge-based collaborative intrusion detection

JOURNAL ARTICLE published April 2021 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (61772148)

Authors: Wenjuan Li | Yu Wang | Jin Li | Man Ho Au

Enhancing host security using external environment sensors

JOURNAL ARTICLE published October 2011 in International Journal of Information Security

Authors: Ee-Chien Chang | Liming Lu | Yongzheng Wu | Roland H. C. Yap | Jie Yu

Hiding information against structural re-identification

JOURNAL ARTICLE published April 2019 in International Journal of Information Security

Authors: Gábor György Gulyás | Sándor Imre

Towards safer information sharing in the cloud

JOURNAL ARTICLE published August 2015 in International Journal of Information Security

Authors: Marco Casassa-Mont | Ilaria Matteucci | Marinella Petrocchi | Marco Luca Sbodio

Improved yoking proof protocols for preserving anonymity

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Research funded by National Research Foundation of Korea (2015R1D1A1A01058928)

Authors: HyoungMin Ham | JongHyup Lee | JooSeok Song

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: Yukio Itakura | Masaki Hashiyada | Toshio Nagashima | Shigeo Tsujii

Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR

JOURNAL ARTICLE published January 2008 in International Journal of Information Security

Authors: Michael Backes | Birgit Pfitzmann

Trusted mobile model based on DTE technology

JOURNAL ARTICLE published October 2015 in International Journal of Information Security

Authors: Tao Li | Aiqun Hu

Handling distributed authorization with delegation through answer set programming

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: Shujing Wang | Yan Zhang

Efficient trace and revoke schemes

JOURNAL ARTICLE published December 2010 in International Journal of Information Security

Authors: Moni Naor | Benny Pinkas

A game-theoretic approach for integrity assurance in resource-bounded systems

JOURNAL ARTICLE published April 2018 in International Journal of Information Security

Research funded by National Science Foundation (CNS-1239166,CNS-1238959)

Authors: Aron Laszka | Yevgeniy Vorobeychik | Xenofon Koutsoukos

Time-specific encryption from forward-secure encryption: generic and direct constructions

JOURNAL ARTICLE published October 2016 in International Journal of Information Security

Authors: Kohei Kasamatsu | Takahiro Matsuda | Keita Emura | Nuttapong Attrapadung | Goichiro Hanaoka | Hideki Imai

On the insecurity of quantum Bitcoin mining

JOURNAL ARTICLE published June 2020 in International Journal of Information Security

Research funded by Israel Science Foundation (grant 682/18) | Israel Science Foundation (2137/19)

Authors: Or Sattath

Do you really mean what you actually enforced?

JOURNAL ARTICLE published August 2011 in International Journal of Information Security

Authors: Nataliia Bielova | Fabio Massacci

Embedding renewable cryptographic keys into noisy data

JOURNAL ARTICLE published June 2010 in International Journal of Information Security

Authors: Ileana Buhan | Jeroen Doumen | Pieter Hartel | Qian Tang | Raymond Veldhuis