Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 933 results
Sort by: relevance publication year

Anonymity in traceable cloud data broadcast system with simultaneous individual messaging

JOURNAL ARTICLE published June 2021 in International Journal of Information Security

Research funded by University Grants Commission (F1-17.1/2014-15/RGNF-2014-15-SC-WES-58080/(SA-III/Website))

Authors: Mriganka Mandal

A conceptual model of security context

JOURNAL ARTICLE published November 2014 in International Journal of Information Security

Authors: Vladimir Jovanovikj | Dušan Gabrijelčič | Tomaž Klobučar

Gossamer: weaknesses and performance

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: P. D’Arco | R. De Prisco | Z. Ebadi Ansaroudi | R. Zaccagnino

Portfolio optimization of computer and mobile botnets

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Qi Liao | Zhen Li

Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Authors: Yinhao Jiang | Willy Susilo | Yi Mu | Fuchun Guo

Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

JOURNAL ARTICLE published November 2016 in International Journal of Information Security

Research funded by German Research Foundation (DFG) (Fi 940/3-1, Fi 940/3-2) | German Federal Ministry of Education and Research (BMBF) (EC SPRIDE,EC SPRIDE) | German Research Foundation (DFG) (CRC 1119,CRC 1119) | Hessian LOEWE excellence initiaive (CASED,CASED) | Engineering and Physical Sciences Research Council (EPSRC) (EP/H005455/1,EP/H005455/1)

Authors: Jean Paul Degabriele | Victoria Fehr | Marc Fischlin | Tommaso Gagliardoni | Felix Günther | Giorgia Azzurra Marson | Arno Mittelbach | Kenneth G. Paterson

Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Authors: Hiroki Inayoshi | Shohei Kakei | Eiji Takimoto | Koichi Mouri | Shoichi Saito

Efficient verifiable computation over quotient polynomial rings

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Research funded by Institute for Information and Communications Technology Promotion (20210007270012002,20210007270012002)

Authors: Jai Hyun Park | Jung Hee Cheon | Dongwoo Kim

Efficient wildcard search over encrypted data

JOURNAL ARTICLE published October 2016 in International Journal of Information Security

Research funded by 973 program (2013CB834205) | China Postdoctoral Science Foundation (2013M532104) | Natural Science Foundation of Zhejiang Province (LZ12F02005)

Authors: Changhui Hu | Lidong Han

An algebraic approach to the verification of a class of Diffie-Hellman protocols

JOURNAL ARTICLE published 19 March 2007 in International Journal of Information Security

Authors: Rob Delicata | Steve Schneider

Concrete- and abstract-based access control

JOURNAL ARTICLE published August 2011 in International Journal of Information Security

Authors: Yacine Bouzida | Luigi Logrippo | Serge Mankovski

Correction to: A decentralized honeypot for IoT Protocols based on Android devices

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Irini Lygerou | Shreyas Srinivasa | Emmanouil Vasilomanolakis | George Stergiopoulos | Dimitris Gritzalis

Cryptanalytic time–memory trade-off for password hashing schemes

JOURNAL ARTICLE published April 2019 in International Journal of Information Security

Authors: Donghoon Chang | Arpan Jati | Sweta Mishra | Somitra Kumar Sanadhya

Attribute inference privacy protection for pre-trained models

JOURNAL ARTICLE published 2 April 2024 in International Journal of Information Security

Research funded by SERC Discovery Grants (RGPIN-2022-04127)

Authors: Hossein Abedi Khorasgani | Noman Mohammed | Yang Wang

Information-theoretically secure oblivious polynomial evaluation in the commodity-based model

JOURNAL ARTICLE published February 2015 in International Journal of Information Security

Authors: Rafael Tonicelli | Anderson C. A. Nascimento | Rafael Dowsley | Jörn Müller-Quade | Hideki Imai | Goichiro Hanaoka | Akira Otsuka

Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Authors: Eranga Bandara | Xueping Liang | Sachin Shetty | Ravi Mukkamala | Peter Foytik | Nalin Ranasinghe | Kasun De Zoysa

A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Nasir Ibrahim | Harin Sellahewa

P2ADF: a privacy-preserving attack detection framework in fog-IoT environment

JOURNAL ARTICLE published August 2023 in International Journal of Information Security

Authors: Jasleen Kaur | Alka Agrawal | Raees Ahmad Khan

Perfect secrecy systems immune to spoofing attacks

JOURNAL ARTICLE published August 2012 in International Journal of Information Security

Authors: Michael Huber

From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity

JOURNAL ARTICLE published 19 January 2024 in International Journal of Information Security

Research funded by National Research Foundation, Singapore (NRF) and Maritime and Port Authority of Singapore (SMI-2022-MTP-04)

Authors: Awais Yousaf | Jianying Zhou