Facet browsing currently unavailable
Page 4 of 933 results
Sort by: relevance publication year
Optimal noise functions for location privacy on continuous regions JOURNAL ARTICLE published November 2018 in International Journal of Information Security |
A hybrid scheme for securing fingerprint templates JOURNAL ARTICLE published October 2010 in International Journal of Information Security |
Analysing a stream authentication protocol using model checking JOURNAL ARTICLE published October 2004 in International Journal of Information Security |
Outsourced pattern matching JOURNAL ARTICLE published June 2018 in International Journal of Information Security Research funded by European Union’s Horizon 2020 research and innovation programme (644666) |
Efficient attribute-based encryption with repeated attributes optimization JOURNAL ARTICLE published June 2021 in International Journal of Information Security Research funded by National Natural Science Foundation of China (U1401251) |
A systematic literature review on wearable health data publishing under differential privacy JOURNAL ARTICLE published August 2022 in International Journal of Information Security |
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization JOURNAL ARTICLE published October 2019 in International Journal of Information Security |
An algebraic approach to the verification of a class of Diffie-Hellman protocols JOURNAL ARTICLE published 19 March 2007 in International Journal of Information Security |
Concrete- and abstract-based access control JOURNAL ARTICLE published August 2011 in International Journal of Information Security |
Correction to: A decentralized honeypot for IoT Protocols based on Android devices JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
Embedding renewable cryptographic keys into noisy data JOURNAL ARTICLE published June 2010 in International Journal of Information Security |
Privacy-enhanced architecture for smart metering JOURNAL ARTICLE published April 2013 in International Journal of Information Security |
SilentKnock: practical, provably undetectable authentication JOURNAL ARTICLE published April 2009 in International Journal of Information Security |
DUEF-GA: data utility and privacy evaluation framework for graph anonymization JOURNAL ARTICLE published August 2020 in International Journal of Information Security Research funded by Ministerio de Ciencia Tecnología y Telecomunicaciones (TIN2014-57364-C2-2-R,RTI2018-095094-B-C22) |
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Do you really mean what you actually enforced? JOURNAL ARTICLE published August 2011 in International Journal of Information Security |
On the insecurity of quantum Bitcoin mining JOURNAL ARTICLE published June 2020 in International Journal of Information Security Research funded by Israel Science Foundation (grant 682/18) | Israel Science Foundation (2137/19) |
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity JOURNAL ARTICLE published 19 January 2024 in International Journal of Information Security Research funded by National Research Foundation, Singapore (NRF) and Maritime and Port Authority of Singapore (SMI-2022-MTP-04) |
Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection JOURNAL ARTICLE published April 2017 in International Journal of Information Security |
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces JOURNAL ARTICLE published June 2022 in International Journal of Information Security |