Facet browsing currently unavailable
Page 7 of 934 results
Sort by: relevance publication year
Private and oblivious set and multiset operations JOURNAL ARTICLE published October 2016 in International Journal of Information Security |
Estimating the maximum information leakage JOURNAL ARTICLE published June 2008 in International Journal of Information Security |
A secure architecture for TCP/UDP-based cloud communications JOURNAL ARTICLE published April 2021 in International Journal of Information Security Research funded by Natural Sciences and Engineering Research Council of Canada (RGPIN-2019-04651) | Canada Research Chairs (231318) |
Secure modular password authentication for the web using channel bindings JOURNAL ARTICLE published November 2016 in International Journal of Information Security Research funded by Deutsche Forschungsgemeinschaft (MA 4957) | Australian Research Council (DP130104304) |
Using targeted Bayesian network learning for suspect identification in communication networks JOURNAL ARTICLE published April 2018 in International Journal of Information Security |
Generating ICS vulnerability playbooks with open standards JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
A modular cyber security training programme for the maritime domain JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Information security and privacy challenges of cloud computing for government adoption: a systematic review JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
The rise of “security and privacy”: bibliometric analysis of computer privacy research JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Enhancing security in QCA-based circuits using optimal key gate placement JOURNAL ARTICLE published 17 April 2024 in International Journal of Information Security |
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes JOURNAL ARTICLE published October 2018 in International Journal of Information Security |
Provably secure public-key encryption with conjunctive and subset keyword search JOURNAL ARTICLE published October 2019 in International Journal of Information Security Research funded by Horizon 2020 Framework Programme (H2020-ICT-2014-1-644024) | Ministerio de Educación, Cultura y Deporte (TIN2014-57364-C2-1-R,TIN2016-80250-R) | Agència de Gestió d’Ajuts Universitaris i de Recerca (2014 SGR 537) |
A trust management scheme for IoT-enabled environmental health/accessibility monitoring services JOURNAL ARTICLE published February 2020 in International Journal of Information Security |
Formal modeling and automatic enforcement of Bring Your Own Device policies JOURNAL ARTICLE published April 2015 in International Journal of Information Security |
Highly private blockchain-based management system for digital COVID-19 certificates JOURNAL ARTICLE published October 2022 in International Journal of Information Security |
Secure universal designated verifier signature without random oracles JOURNAL ARTICLE published June 2008 in International Journal of Information Security |
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis JOURNAL ARTICLE published November 2012 in International Journal of Information Security |