Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 933 results
Sort by: relevance publication year

Password-authenticated key exchange based on RSA

JOURNAL ARTICLE published December 2010 in International Journal of Information Security

Authors: Philip MacKenzie | Sarvar Patel | Ram Swaminathan

On hash functions using checksums

JOURNAL ARTICLE published April 2010 in International Journal of Information Security

Authors: Praveen Gauravaram | John Kelsey | Lars R. Knudsen | Søren S. Thomsen

Efficient identity-based GQ multisignatures

JOURNAL ARTICLE published June 2009 in International Journal of Information Security

Authors: Lein Harn | Jian Ren | Changlu Lin

Security and searchability in secret sharing-based data outsourcing

JOURNAL ARTICLE published November 2015 in International Journal of Information Security

Authors: Mohammad Ali Hadavi | Rasool Jalili | Ernesto Damiani | Stelvio Cimato

Preface to the special issue on ISC 2003

JOURNAL ARTICLE published October 2005 in International Journal of Information Security

Authors: Colin Boyd | Wenbo Mao

Securing the controller area network with covert voltage channels

JOURNAL ARTICLE published December 2021 in International Journal of Information Security

Research funded by Romanian Ministry of Research and Innovation, CNCS-UEFISCDI (PN-III-P1-1.1-TE-2016-1317)

Authors: Pal-Stefan Murvay | Lucian Popa | Bogdan Groza

A formal modeling and analysis approach for access control rules, policies, and their combinations

JOURNAL ARTICLE published February 2017 in International Journal of Information Security

Authors: Vahid R. Karimi | Paulo S. C. Alencar | Donald D. Cowan

An online intrusion detection method for industrial control systems based on extended belief rule base

JOURNAL ARTICLE published 26 April 2024 in International Journal of Information Security

Research funded by Postdoctoral Science Foundation of China (No. 2020M683736) | Teaching Reform Project of Higher Education in Heilongjiang Province (No. SJGY20210456) | Natural Science Foundation of Heilongjiang Province of China (No. LH2021F038) | Social Science Foundation of Heilongjiang Province of China (No. 21GLC189) | Foreign Expert Projects in Heilongjiang (No. GZ20220131)

Authors: Guangyu Qian | Jinyuan Li | Wei He | Wei Zhang | You Cao

Defense against membership inference attack in graph neural networks through graph perturbation

JOURNAL ARTICLE published April 2023 in International Journal of Information Security

Authors: Kai Wang | Jinxia Wu | Tianqing Zhu | Wei Ren | Ying Hong

A hybrid scheme for securing fingerprint templates

JOURNAL ARTICLE published October 2010 in International Journal of Information Security

Authors: Haiyong Chen | Hailiang Chen

Analysing a stream authentication protocol using model checking

JOURNAL ARTICLE published October 2004 in International Journal of Information Security

Authors: Philippa Hopcroft | Gavin Lowe

Outsourced pattern matching

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Research funded by European Union’s Horizon 2020 research and innovation programme (644666)

Authors: Sebastian Faust | Carmit Hazay | Daniele Venturi

Efficient attribute-based encryption with repeated attributes optimization

JOURNAL ARTICLE published June 2021 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (U1401251)

Authors: Fawad Khan | Hui Li | Yinghui Zhang | Haider Abbas | Tahreem Yaqoob

Secure outsourcing of manufacturing compliance checks

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Aikaterini Triakosia | Panagiotis Rizomiliotis | Cecilia Tonelli | Fabio Federici | Valerio Senni

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Marius Elmiger | Mouad Lemoudden | Nikolaos Pitropakis | William J. Buchanan

GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Research funded by Army Research Office (W911NF-21-1-0326,W911NF-21-1-0326) | Army Research Office (W911NF-21-1-0326,W911NF-21-1-0326,W911NF-21-1-0326)

Authors: Fabrice Mvah | Vianney Kengne Tchendji | Clémentin Tayou Djamegni | Ahmed H. Anwar | Deepak K. Tosh | Charles Kamhoua

Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks

JOURNAL ARTICLE published October 2014 in International Journal of Information Security

Authors: Rehana Yasmin | Eike Ritter | Guilin Wang

SilentKnock: practical, provably undetectable authentication

JOURNAL ARTICLE published April 2009 in International Journal of Information Security

Authors: Eugene Y. Vasserman | Nicholas Hopper | James Tyra

DUEF-GA: data utility and privacy evaluation framework for graph anonymization

JOURNAL ARTICLE published August 2020 in International Journal of Information Security

Research funded by Ministerio de Ciencia Tecnología y Telecomunicaciones (TIN2014-57364-C2-2-R,RTI2018-095094-B-C22)

Authors: Jordi Casas-Roma

Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results

JOURNAL ARTICLE published November 2013 in International Journal of Information Security

Authors: Emmanuel Bresson | Dario Catalano | Mario Di Raimondo | Dario Fiore | Rosario Gennaro