Facet browsing currently unavailable
Page 6 of 934 results
Sort by: relevance publication year
Enhanced GeoProof: improved geographic assurance for data in the cloud JOURNAL ARTICLE published April 2014 in International Journal of Information Security |
Secure modular password authentication for the web using channel bindings JOURNAL ARTICLE published November 2016 in International Journal of Information Security Research funded by Deutsche Forschungsgemeinschaft (MA 4957) | Australian Research Council (DP130104304) |
Using targeted Bayesian network learning for suspect identification in communication networks JOURNAL ARTICLE published April 2018 in International Journal of Information Security |
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries JOURNAL ARTICLE published October 2022 in International Journal of Information Security Research funded by TUBITAK (118E141) |
Delegation in role-based access control JOURNAL ARTICLE published April 2008 in International Journal of Information Security |
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves JOURNAL ARTICLE published November 2004 in International Journal of Information Security |
Write-only oblivious RAM-based privacy-preserved access of outsourced data JOURNAL ARTICLE published February 2017 in International Journal of Information Security Research funded by Agency for Science, Technology and Research (TSRP 102 158 0038) |
RORI-based countermeasure selection using the OrBAC formalism JOURNAL ARTICLE published February 2014 in International Journal of Information Security |
Activity-based payments: alternative (anonymous) online payment model JOURNAL ARTICLE published 3 February 2024 in International Journal of Information Security |
Two-factor authentication for the Bitcoin protocol JOURNAL ARTICLE published April 2017 in International Journal of Information Security |
You click, I steal: analyzing and detecting click hijacking attacks in web pages JOURNAL ARTICLE published August 2019 in International Journal of Information Security |
A review on fake news detection 3T’s: typology, time of detection, taxonomies JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
Neighbor discovery protocol anomaly-based detection system using neural network algorithm JOURNAL ARTICLE published 11 February 2024 in International Journal of Information Security |
A certificateless approach to onion routing JOURNAL ARTICLE published June 2017 in International Journal of Information Security |
A survey on analyzing encrypted network traffic of mobile devices JOURNAL ARTICLE published August 2022 in International Journal of Information Security Research funded by Defence Research and Development Organisation (CARS-46) |
Estimating the maximum information leakage JOURNAL ARTICLE published June 2008 in International Journal of Information Security |
Protection of centralized SDN control plane from high-rate Packet-In messages JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Generating ICS vulnerability playbooks with open standards JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning JOURNAL ARTICLE published April 2024 in International Journal of Information Security |