Facet browsing currently unavailable
Page 4 of 934 results
Sort by: relevance publication year
Secure universal designated verifier signature without random oracles JOURNAL ARTICLE published June 2008 in International Journal of Information Security |
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis JOURNAL ARTICLE published November 2012 in International Journal of Information Security |
Zheng and Seberry’s public key encryption scheme revisited JOURNAL ARTICLE published November 2003 in International Journal of Information Security |
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
Minimizing TTP's involvement in signature validation JOURNAL ARTICLE published January 2006 in International Journal of Information Security |
Cryptographically sound security proofs for basic and public-key Kerberos JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
AutoPKI: public key infrastructure for IoT with automated trust transfer JOURNAL ARTICLE published 2 March 2024 in International Journal of Information Security |
Passive-attack analysis for connection-based anonymity systems JOURNAL ARTICLE published June 2005 in International Journal of Information Security |
Resolving privacy-preserving relationships over outsourced encrypted data storages JOURNAL ARTICLE published April 2016 in International Journal of Information Security |
A multi-objective cost–benefit optimization algorithm for network hardening JOURNAL ARTICLE published August 2022 in International Journal of Information Security |
Stack inspection and secure program transformations JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
TENET: a new hybrid network architecture for adversarial defense JOURNAL ARTICLE published August 2023 in International Journal of Information Security |
A modular cyber security training programme for the maritime domain JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
New constructions of OSBE schemes and their applications in oblivious access control JOURNAL ARTICLE published November 2012 in International Journal of Information Security |
A method for identifying Web applications JOURNAL ARTICLE published December 2009 in International Journal of Information Security |
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators JOURNAL ARTICLE published August 2018 in International Journal of Information Security Research funded by National Basic Research Program of China (973 Program) (NO. 2012CB315901) |
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle JOURNAL ARTICLE published 10 May 2024 in International Journal of Information Security |
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats JOURNAL ARTICLE published October 2022 in International Journal of Information Security Research funded by H2020 Societal Challenges (740829) |
PolicyUpdater: a system for dynamic access control JOURNAL ARTICLE published July 2006 in International Journal of Information Security |
An integrated deep learning model for Ethereum smart contract vulnerability detection JOURNAL ARTICLE published February 2024 in International Journal of Information Security |