Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 6 of 934 results
Sort by: relevance publication year

Enhanced GeoProof: improved geographic assurance for data in the cloud

JOURNAL ARTICLE published April 2014 in International Journal of Information Security

Authors: Aiiad Albeshri | Colin Boyd | Juan González Nieto

Secure modular password authentication for the web using channel bindings

JOURNAL ARTICLE published November 2016 in International Journal of Information Security

Research funded by Deutsche Forschungsgemeinschaft (MA 4957) | Australian Research Council (DP130104304)

Authors: Mark Manulis | Douglas Stebila | Franziskus Kiefer | Nick Denham

Using targeted Bayesian network learning for suspect identification in communication networks

JOURNAL ARTICLE published April 2018 in International Journal of Information Security

Authors: A. Gruber | I. Ben-Gal

Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Research funded by TUBITAK (118E141)

Authors: Beyza Cevik | Nur Altiparmak | Murat Aksu | Sevil Sen

Delegation in role-based access control

JOURNAL ARTICLE published April 2008 in International Journal of Information Security

Authors: Jason Crampton | Hemanth Khambhammettu

The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves

JOURNAL ARTICLE published November 2004 in International Journal of Information Security

Authors: Yvonne Hitchcock | Paul Montague | Gary Carter | Ed Dawson

Write-only oblivious RAM-based privacy-preserved access of outsourced data

JOURNAL ARTICLE published February 2017 in International Journal of Information Security

Research funded by Agency for Science, Technology and Research (TSRP 102 158 0038)

Authors: Lichun Li | Anwitaman Datta

RORI-based countermeasure selection using the OrBAC formalism

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Gustavo Gonzalez Granadillo | Malek Belhaouane | Hervé Debar | Grégoire Jacob

Activity-based payments: alternative (anonymous) online payment model

JOURNAL ARTICLE published 3 February 2024 in International Journal of Information Security

Authors: Rafał Leszczyna

Two-factor authentication for the Bitcoin protocol

JOURNAL ARTICLE published April 2017 in International Journal of Information Security

Authors: Christopher Mann | Daniel Loebenberger

You click, I steal: analyzing and detecting click hijacking attacks in web pages

JOURNAL ARTICLE published August 2019 in International Journal of Information Security

Authors: Anil Saini | Manoj Singh Gaur | Vijay Laxmi | Mauro Conti

A review on fake news detection 3T’s: typology, time of detection, taxonomies

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Shubhangi Rastogi | Divya Bansal

Neighbor discovery protocol anomaly-based detection system using neural network algorithm

JOURNAL ARTICLE published 11 February 2024 in International Journal of Information Security

Authors: Redhwan M. A. Saad | Mohammed Anbar | Selvakumar Manickam | Samir I. Shaheen | Iznan H. Hasbullah

A certificateless approach to onion routing

JOURNAL ARTICLE published June 2017 in International Journal of Information Security

Authors: Dario Catalano | Dario Fiore | Rosario Gennaro

A survey on analyzing encrypted network traffic of mobile devices

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Research funded by Defence Research and Development Organisation (CARS-46)

Authors: Ankit Agrawal | Ashutosh Bhatia | Ayush Bahuguna | Kamlesh Tiwari | K. Haribabu | Deepak Vishwakarma | Rekha Kaushik

Estimating the maximum information leakage

JOURNAL ARTICLE published June 2008 in International Journal of Information Security

Authors: Alessandro Aldini | Alessandra Di Pierro

Protection of centralized SDN control plane from high-rate Packet-In messages

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Suhail Ahmad | Ajaz Hussain Mir

Generating ICS vulnerability playbooks with open standards

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Philip Empl | Daniel Schlette | Lukas Stöger | Günther Pernul

De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Thomas Prantl | Lukas Horn | Simon Engel | Lukas Iffländer | Lukas Beierlieb | Christian Krupitzer | André Bauer | Mansi Sakarvadia | Ian Foster | Samuel Kounev

Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Fatna El Mendili | Mohammed Fattah | Nisrine Berros | Youness Filaly | Younès El Bouzekri El Idrissi