Facet browsing currently unavailable
Page 3 of 933 results
Sort by: relevance publication year
Password-authenticated key exchange based on RSA JOURNAL ARTICLE published December 2010 in International Journal of Information Security |
On hash functions using checksums JOURNAL ARTICLE published April 2010 in International Journal of Information Security |
Efficient identity-based GQ multisignatures JOURNAL ARTICLE published June 2009 in International Journal of Information Security |
Security and searchability in secret sharing-based data outsourcing JOURNAL ARTICLE published November 2015 in International Journal of Information Security |
Preface to the special issue on ISC 2003 JOURNAL ARTICLE published October 2005 in International Journal of Information Security |
Securing the controller area network with covert voltage channels JOURNAL ARTICLE published December 2021 in International Journal of Information Security Research funded by Romanian Ministry of Research and Innovation, CNCS-UEFISCDI (PN-III-P1-1.1-TE-2016-1317) |
A formal modeling and analysis approach for access control rules, policies, and their combinations JOURNAL ARTICLE published February 2017 in International Journal of Information Security |
An online intrusion detection method for industrial control systems based on extended belief rule base JOURNAL ARTICLE published 26 April 2024 in International Journal of Information Security Research funded by Postdoctoral Science Foundation of China (No. 2020M683736) | Teaching Reform Project of Higher Education in Heilongjiang Province (No. SJGY20210456) | Natural Science Foundation of Heilongjiang Province of China (No. LH2021F038) | Social Science Foundation of Heilongjiang Province of China (No. 21GLC189) | Foreign Expert Projects in Heilongjiang (No. GZ20220131) |
Defense against membership inference attack in graph neural networks through graph perturbation JOURNAL ARTICLE published April 2023 in International Journal of Information Security |
A hybrid scheme for securing fingerprint templates JOURNAL ARTICLE published October 2010 in International Journal of Information Security |
Analysing a stream authentication protocol using model checking JOURNAL ARTICLE published October 2004 in International Journal of Information Security |
Outsourced pattern matching JOURNAL ARTICLE published June 2018 in International Journal of Information Security Research funded by European Union’s Horizon 2020 research and innovation programme (644666) |
Efficient attribute-based encryption with repeated attributes optimization JOURNAL ARTICLE published June 2021 in International Journal of Information Security Research funded by National Natural Science Foundation of China (U1401251) |
Secure outsourcing of manufacturing compliance checks JOURNAL ARTICLE published February 2024 in International Journal of Information Security |
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant JOURNAL ARTICLE published February 2024 in International Journal of Information Security |
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks JOURNAL ARTICLE published February 2024 in International Journal of Information Security Research funded by Army Research Office (W911NF-21-1-0326,W911NF-21-1-0326) | Army Research Office (W911NF-21-1-0326,W911NF-21-1-0326,W911NF-21-1-0326) |
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks JOURNAL ARTICLE published October 2014 in International Journal of Information Security |
SilentKnock: practical, provably undetectable authentication JOURNAL ARTICLE published April 2009 in International Journal of Information Security |
DUEF-GA: data utility and privacy evaluation framework for graph anonymization JOURNAL ARTICLE published August 2020 in International Journal of Information Security Research funded by Ministerio de Ciencia Tecnología y Telecomunicaciones (TIN2014-57364-C2-2-R,RTI2018-095094-B-C22) |
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results JOURNAL ARTICLE published November 2013 in International Journal of Information Security |