Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 934 results
Sort by: relevance publication year

Secure universal designated verifier signature without random oracles

JOURNAL ARTICLE published June 2008 in International Journal of Information Security

Authors: Xinyi Huang | Willy Susilo | Yi Mu | Wei Wu

The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Nasour Bagheri | Praveen Gauravaram | Lars R. Knudsen | Erik Zenner

Zheng and Seberry’s public key encryption scheme revisited

JOURNAL ARTICLE published November 2003 in International Journal of Information Security

Authors: Joonsang Baek | Yuliang Zheng

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: Michiharu Kudo

Minimizing TTP's involvement in signature validation

JOURNAL ARTICLE published January 2006 in International Journal of Information Security

Authors: Jianying Zhou | Feng Bao | Robert Deng

Cryptographically sound security proofs for basic and public-key Kerberos

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

Authors: Michael Backes | Iliano Cervesato | Aaron D. Jaggard | Andre Scedrov | Joe-Kai Tsay

AutoPKI: public key infrastructure for IoT with automated trust transfer

JOURNAL ARTICLE published 2 March 2024 in International Journal of Information Security

Authors: Joel Höglund | Simon Bouget | Martin Furuhed | John Preuß Mattsson | Göran Selander | Shahid Raza

Passive-attack analysis for connection-based anonymity systems

JOURNAL ARTICLE published June 2005 in International Journal of Information Security

Authors: Andrei Serjantov | Peter Sewell

Resolving privacy-preserving relationships over outsourced encrypted data storages

JOURNAL ARTICLE published April 2016 in International Journal of Information Security

Authors: Alberto Huertas Celdrán | Ginés Dólera Tormo | Félix Gómez Mármol | Manuel Gil Pérez | Gregorio Martínez Pérez

A multi-objective cost–benefit optimization algorithm for network hardening

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Authors: Kengo Zenitani

Stack inspection and secure program transformations

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: Massimo Bartoletti | Pierpaolo Degano | Gian Luigi Ferrari

TENET: a new hybrid network architecture for adversarial defense

JOURNAL ARTICLE published August 2023 in International Journal of Information Security

Authors: Omer Faruk Tuna | Ferhat Ozgur Catak | M. Taner Eskil

A modular cyber security training programme for the maritime domain

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Aybars Oruc | Nabin Chowdhury | Vasileios Gkioulos

New constructions of OSBE schemes and their applications in oblivious access control

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Jinguang Han | Willy Susilo | Yi Mu | Jun Yan

A method for identifying Web applications

JOURNAL ARTICLE published December 2009 in International Journal of Information Security

Authors: Mario Kozina | Marin Golub | Stjepan Groš

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Research funded by National Basic Research Program of China (973 Program) (NO. 2012CB315901)

Authors: Hongyong Jia | Yue Chen | Julong Lan | Kaixiang Huang | Jun Wang

Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle

JOURNAL ARTICLE published 10 May 2024 in International Journal of Information Security

Authors: Alexandros Zacharis | Vasilios Katos | Constantinos Patsakis

The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Research funded by H2020 Societal Challenges (740829)

Authors: Vasileios Vlachos | Yannis C. Stamatiou | Pantelis Tzamalis | Sotiris Nikoletseas

PolicyUpdater: a system for dynamic access control

JOURNAL ARTICLE published July 2006 in International Journal of Information Security

Authors: Vino Fernando Crescini | Yan Zhang

An integrated deep learning model for Ethereum smart contract vulnerability detection

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Vikas Kumar Jain | Meenakshi Tripathi