Facet browsing currently unavailable
Page 2 of 933 results
Sort by: relevance publication year
Randomized gossip algorithms under attack JOURNAL ARTICLE published August 2014 in International Journal of Information Security |
A shuffle to achieve high efficiency through pre-computation and batch verification JOURNAL ARTICLE published August 2013 in International Journal of Information Security |
Provably secure E-cash system with practical and efficient complete tracing JOURNAL ARTICLE published June 2014 in International Journal of Information Security |
A distributed digital rights management model for secure information-distribution systems JOURNAL ARTICLE published November 2004 in International Journal of Information Security |
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack JOURNAL ARTICLE published 4 April 2024 in International Journal of Information Security |
Toward a blockchain-based framework for challenge-based collaborative intrusion detection JOURNAL ARTICLE published April 2021 in International Journal of Information Security Research funded by National Natural Science Foundation of China (61772148) |
Enhancing host security using external environment sensors JOURNAL ARTICLE published October 2011 in International Journal of Information Security |
Hiding information against structural re-identification JOURNAL ARTICLE published April 2019 in International Journal of Information Security |
Towards safer information sharing in the cloud JOURNAL ARTICLE published August 2015 in International Journal of Information Security |
Improved yoking proof protocols for preserving anonymity JOURNAL ARTICLE published August 2018 in International Journal of Information Security Research funded by National Research Foundation of Korea (2015R1D1A1A01058928) |
JOURNAL ARTICLE published November 2002 in International Journal of Information Security |
Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR JOURNAL ARTICLE published January 2008 in International Journal of Information Security |
Trusted mobile model based on DTE technology JOURNAL ARTICLE published October 2015 in International Journal of Information Security |
Handling distributed authorization with delegation through answer set programming JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |
Efficient trace and revoke schemes JOURNAL ARTICLE published December 2010 in International Journal of Information Security |
A game-theoretic approach for integrity assurance in resource-bounded systems JOURNAL ARTICLE published April 2018 in International Journal of Information Security Research funded by National Science Foundation (CNS-1239166,CNS-1238959) |
Time-specific encryption from forward-secure encryption: generic and direct constructions JOURNAL ARTICLE published October 2016 in International Journal of Information Security |
On the insecurity of quantum Bitcoin mining JOURNAL ARTICLE published June 2020 in International Journal of Information Security Research funded by Israel Science Foundation (grant 682/18) | Israel Science Foundation (2137/19) |
Do you really mean what you actually enforced? JOURNAL ARTICLE published August 2011 in International Journal of Information Security |
Embedding renewable cryptographic keys into noisy data JOURNAL ARTICLE published June 2010 in International Journal of Information Security |