Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 933 results
Sort by: relevance publication year

A formal modeling and analysis approach for access control rules, policies, and their combinations

JOURNAL ARTICLE published February 2017 in International Journal of Information Security

Authors: Vahid R. Karimi | Paulo S. C. Alencar | Donald D. Cowan

An online intrusion detection method for industrial control systems based on extended belief rule base

JOURNAL ARTICLE published 26 April 2024 in International Journal of Information Security

Research funded by Postdoctoral Science Foundation of China (No. 2020M683736) | Teaching Reform Project of Higher Education in Heilongjiang Province (No. SJGY20210456) | Natural Science Foundation of Heilongjiang Province of China (No. LH2021F038) | Social Science Foundation of Heilongjiang Province of China (No. 21GLC189) | Foreign Expert Projects in Heilongjiang (No. GZ20220131)

Authors: Guangyu Qian | Jinyuan Li | Wei He | Wei Zhang | You Cao

Defense against membership inference attack in graph neural networks through graph perturbation

JOURNAL ARTICLE published April 2023 in International Journal of Information Security

Authors: Kai Wang | Jinxia Wu | Tianqing Zhu | Wei Ren | Ying Hong

Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards

JOURNAL ARTICLE published 14 March 2024 in International Journal of Information Security

Authors: Anil Kumar Chillara | Paresh Saxena | Rajib Ranjan Maiti | Manik Gupta | Raghu Kondapalli | Zhichao Zhang | Krishnakumar Kesavan

TermID: a distributed swarm intelligence-based approach for wireless intrusion detection

JOURNAL ARTICLE published August 2017 in International Journal of Information Security

Authors: Constantinos Kolias | Vasilis Kolias | Georgios Kambourakis

Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results

JOURNAL ARTICLE published November 2013 in International Journal of Information Security

Authors: Emmanuel Bresson | Dario Catalano | Mario Di Raimondo | Dario Fiore | Rosario Gennaro

Anonymity in traceable cloud data broadcast system with simultaneous individual messaging

JOURNAL ARTICLE published June 2021 in International Journal of Information Security

Research funded by University Grants Commission (F1-17.1/2014-15/RGNF-2014-15-SC-WES-58080/(SA-III/Website))

Authors: Mriganka Mandal

Less is more: relaxed yet composable security notions for key exchange

JOURNAL ARTICLE published August 2013 in International Journal of Information Security

Authors: C. Brzuska | M. Fischlin | N. P. Smart | B. Warinschi | S. C. Williams

Two-party generation of DSA signatures

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: Philip MacKenzie | Michael K. Reiter

Implementing public-key cryptography on passive RFID tags is practical

JOURNAL ARTICLE published February 2015 in International Journal of Information Security

Authors: Alex Arbit | Yoel Livne | Yossef Oren | Avishai Wool

Perfect secrecy systems immune to spoofing attacks

JOURNAL ARTICLE published August 2012 in International Journal of Information Security

Authors: Michael Huber

Gossamer: weaknesses and performance

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: P. D’Arco | R. De Prisco | Z. Ebadi Ansaroudi | R. Zaccagnino

Portfolio optimization of computer and mobile botnets

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Qi Liao | Zhen Li

Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Authors: Yinhao Jiang | Willy Susilo | Yi Mu | Fuchun Guo

Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

JOURNAL ARTICLE published November 2016 in International Journal of Information Security

Research funded by German Research Foundation (DFG) (Fi 940/3-1, Fi 940/3-2) | German Federal Ministry of Education and Research (BMBF) (EC SPRIDE,EC SPRIDE) | German Research Foundation (DFG) (CRC 1119,CRC 1119) | Hessian LOEWE excellence initiaive (CASED,CASED) | Engineering and Physical Sciences Research Council (EPSRC) (EP/H005455/1,EP/H005455/1)

Authors: Jean Paul Degabriele | Victoria Fehr | Marc Fischlin | Tommaso Gagliardoni | Felix Günther | Giorgia Azzurra Marson | Arno Mittelbach | Kenneth G. Paterson

Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Authors: Hiroki Inayoshi | Shohei Kakei | Eiji Takimoto | Koichi Mouri | Shoichi Saito

Efficient verifiable computation over quotient polynomial rings

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Research funded by Institute for Information and Communications Technology Promotion (20210007270012002,20210007270012002)

Authors: Jai Hyun Park | Jung Hee Cheon | Dongwoo Kim

Instruction-level security typing by abstract interpretation

JOURNAL ARTICLE published March 2007 in International Journal of Information Security

Authors: Nicoletta De Francesco | Luca Martini

A methodology to measure and monitor level of operational effectiveness of a CSOC

JOURNAL ARTICLE published April 2018 in International Journal of Information Security

Research funded by Army Research Office (W911NF-13-1-0421 and W911NF-15-1-0576) | Office of Naval Research (N00014-15-1-2007)

Authors: Ankit Shah | Rajesh Ganesan | Sushil Jajodia | Hasan Cam

How to obtain full privacy in auctions

JOURNAL ARTICLE published October 2006 in International Journal of Information Security

Authors: Felix Brandt