Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 934 results
Sort by: relevance publication year

Optimal security hardening on attack tree models of networks: a cost-benefit analysis

JOURNAL ARTICLE published June 2012 in International Journal of Information Security

Authors: Rinku Dewri | Indrajit Ray | Nayot Poolsappasit | Darrell Whitley

A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Alejandro Pérez-Méndez | Fernando Pereñíguez-García | Rafael Marín-López | Gabriel López-Millán

Distributed star coloring of network for IP traceback

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Sangita Roy | Ashok Singh Sairam

Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks

JOURNAL ARTICLE published November 2011 in International Journal of Information Security

Authors: Josep M. Miret | Francesc Sebé

Passive-attack analysis for connection-based anonymity systems

JOURNAL ARTICLE published June 2005 in International Journal of Information Security

Authors: Andrei Serjantov | Peter Sewell

Random dictatorship for privacy-preserving social choice

JOURNAL ARTICLE published October 2020 in International Journal of Information Security

Research funded by Vetenskapsrådet (VR 2016-03346)

Authors: Vicenç Torra

Efficient identity-based online/offline encryption and signcryption with short ciphertext

JOURNAL ARTICLE published June 2017 in International Journal of Information Security

Authors: Jianchang Lai | Yi Mu | Fuchun Guo

A novel two-level secure access control approach for blockchain platform in healthcare

JOURNAL ARTICLE published August 2023 in International Journal of Information Security

Authors: Shweta Mittal | Mohona Ghosh

A review on fake news detection 3T’s: typology, time of detection, taxonomies

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Shubhangi Rastogi | Divya Bansal

A practical privacy-preserving targeted advertising scheme for IPTV users

JOURNAL ARTICLE published August 2016 in International Journal of Information Security

Research funded by TurkTelekom (3014-02)

Authors: Leyli Javid Khayati | Cengiz Orencik | Erkay Savas | Berkant Ustaoglu

Toward tracing and revoking schemes secure against collusion and any form of secret information leakage

JOURNAL ARTICLE published February 2013 in International Journal of Information Security

Authors: Paolo D’Arco | Angel Perez del Pozo

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Yujue Wang | HweeHwa Pang | Robert H. Deng

Authenticating mobile phone users using keystroke analysis

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: N. L. Clarke | S. M. Furnell

A content-based deep intrusion detection system

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: Mahdi Soltani | Mahdi Jafari Siavoshani | Amir Hossein Jahangir

Generalizing cryptosystems based on the subset sum problem

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

Authors: Aniket Kate | Ian Goldberg

Enhanced GeoProof: improved geographic assurance for data in the cloud

JOURNAL ARTICLE published April 2014 in International Journal of Information Security

Authors: Aiiad Albeshri | Colin Boyd | Juan González Nieto

Zheng and Seberry’s public key encryption scheme revisited

JOURNAL ARTICLE published November 2003 in International Journal of Information Security

Authors: Joonsang Baek | Yuliang Zheng

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: Michiharu Kudo

Minimizing TTP's involvement in signature validation

JOURNAL ARTICLE published January 2006 in International Journal of Information Security

Authors: Jianying Zhou | Feng Bao | Robert Deng

Alambic: a privacy-preserving recommender system for electronic commerce

JOURNAL ARTICLE published October 2008 in International Journal of Information Security

Authors: Esma Aïmeur | Gilles Brassard | José M. Fernandez | Flavien Serge Mani Onana