Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 933 results
Sort by: relevance publication year

Optimal noise functions for location privacy on continuous regions

JOURNAL ARTICLE published November 2018 in International Journal of Information Security

Authors: Ehab ElSalamouny | Sébastien Gambs

A hybrid scheme for securing fingerprint templates

JOURNAL ARTICLE published October 2010 in International Journal of Information Security

Authors: Haiyong Chen | Hailiang Chen

Analysing a stream authentication protocol using model checking

JOURNAL ARTICLE published October 2004 in International Journal of Information Security

Authors: Philippa Hopcroft | Gavin Lowe

Outsourced pattern matching

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Research funded by European Union’s Horizon 2020 research and innovation programme (644666)

Authors: Sebastian Faust | Carmit Hazay | Daniele Venturi

Efficient attribute-based encryption with repeated attributes optimization

JOURNAL ARTICLE published June 2021 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (U1401251)

Authors: Fawad Khan | Hui Li | Yinghui Zhang | Haider Abbas | Tahreem Yaqoob

A systematic literature review on wearable health data publishing under differential privacy

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Authors: Munshi Saifuzzaman | Tajkia Nuri Ananna | Mohammad Jabed Morshed Chowdhury | Md Sadek Ferdous | Farida Chowdhury

Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization

JOURNAL ARTICLE published October 2019 in International Journal of Information Security

Authors: Xiaoying Yu | Qi Liao

An algebraic approach to the verification of a class of Diffie-Hellman protocols

JOURNAL ARTICLE published 19 March 2007 in International Journal of Information Security

Authors: Rob Delicata | Steve Schneider

Concrete- and abstract-based access control

JOURNAL ARTICLE published August 2011 in International Journal of Information Security

Authors: Yacine Bouzida | Luigi Logrippo | Serge Mankovski

Correction to: A decentralized honeypot for IoT Protocols based on Android devices

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Irini Lygerou | Shreyas Srinivasa | Emmanouil Vasilomanolakis | George Stergiopoulos | Dimitris Gritzalis

Embedding renewable cryptographic keys into noisy data

JOURNAL ARTICLE published June 2010 in International Journal of Information Security

Authors: Ileana Buhan | Jeroen Doumen | Pieter Hartel | Qian Tang | Raymond Veldhuis

Privacy-enhanced architecture for smart metering

JOURNAL ARTICLE published April 2013 in International Journal of Information Security

Authors: Félix Gómez Mármol | Christoph Sorge | Ronald Petrlic | Osman Ugus | Dirk Westhoff | Gregorio Martínez Pérez

SilentKnock: practical, provably undetectable authentication

JOURNAL ARTICLE published April 2009 in International Journal of Information Security

Authors: Eugene Y. Vasserman | Nicholas Hopper | James Tyra

DUEF-GA: data utility and privacy evaluation framework for graph anonymization

JOURNAL ARTICLE published August 2020 in International Journal of Information Security

Research funded by Ministerio de Ciencia Tecnología y Telecomunicaciones (TIN2014-57364-C2-2-R,RTI2018-095094-B-C22)

Authors: Jordi Casas-Roma

A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Nasir Ibrahim | Harin Sellahewa

Do you really mean what you actually enforced?

JOURNAL ARTICLE published August 2011 in International Journal of Information Security

Authors: Nataliia Bielova | Fabio Massacci

On the insecurity of quantum Bitcoin mining

JOURNAL ARTICLE published June 2020 in International Journal of Information Security

Research funded by Israel Science Foundation (grant 682/18) | Israel Science Foundation (2137/19)

Authors: Or Sattath

From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity

JOURNAL ARTICLE published 19 January 2024 in International Journal of Information Security

Research funded by National Research Foundation, Singapore (NRF) and Maritime and Port Authority of Singapore (SMI-2022-MTP-04)

Authors: Awais Yousaf | Jianying Zhou

Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection

JOURNAL ARTICLE published April 2017 in International Journal of Information Security

Authors: Ankit Singh | Hervais C. Simo Fhom

A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: Lu Zhang | Arie Taal | Reginald Cushing | Cees de Laat | Paola Grosso