Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 7 of 934 results
Sort by: relevance publication year

Private and oblivious set and multiset operations

JOURNAL ARTICLE published October 2016 in International Journal of Information Security

Authors: Marina Blanton | Everaldo Aguiar

Estimating the maximum information leakage

JOURNAL ARTICLE published June 2008 in International Journal of Information Security

Authors: Alessandro Aldini | Alessandra Di Pierro

A secure architecture for TCP/UDP-based cloud communications

JOURNAL ARTICLE published April 2021 in International Journal of Information Security

Research funded by Natural Sciences and Engineering Research Council of Canada (RGPIN-2019-04651) | Canada Research Chairs (231318)

Authors: Abu Faisal | Mohammad Zulkernine

Secure modular password authentication for the web using channel bindings

JOURNAL ARTICLE published November 2016 in International Journal of Information Security

Research funded by Deutsche Forschungsgemeinschaft (MA 4957) | Australian Research Council (DP130104304)

Authors: Mark Manulis | Douglas Stebila | Franziskus Kiefer | Nick Denham

Using targeted Bayesian network learning for suspect identification in communication networks

JOURNAL ARTICLE published April 2018 in International Journal of Information Security

Authors: A. Gruber | I. Ben-Gal

Generating ICS vulnerability playbooks with open standards

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Philip Empl | Daniel Schlette | Lukas Stöger | Günther Pernul

A modular cyber security training programme for the maritime domain

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Aybars Oruc | Nabin Chowdhury | Vasileios Gkioulos

Information security and privacy challenges of cloud computing for government adoption: a systematic review

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Ndukwe Ukeje | Jairo Gutierrez | Krassie Petrova

De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Thomas Prantl | Lukas Horn | Simon Engel | Lukas Iffländer | Lukas Beierlieb | Christian Krupitzer | André Bauer | Mansi Sakarvadia | Ian Foster | Samuel Kounev

Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Firas Hamila | Mohammad Hamad | Daniel Costa Salgado | Sebastian Steinhorst

Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Fatna El Mendili | Mohammed Fattah | Nisrine Berros | Youness Filaly | Younès El Bouzekri El Idrissi

The rise of “security and privacy”: bibliometric analysis of computer privacy research

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Auwal Shehu Ali | Zarul Fitri Zaaba | Manmeet Mahinderjit Singh

Enhancing security in QCA-based circuits using optimal key gate placement

JOURNAL ARTICLE published 17 April 2024 in International Journal of Information Security

Authors: M. Amutha | K. R. Kavitha

Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes

JOURNAL ARTICLE published October 2018 in International Journal of Information Security

Authors: Yinhao Jiang | Willy Susilo | Yi Mu | Fuchun Guo

Provably secure public-key encryption with conjunctive and subset keyword search

JOURNAL ARTICLE published October 2019 in International Journal of Information Security

Research funded by Horizon 2020 Framework Programme (H2020-ICT-2014-1-644024) | Ministerio de Educación, Cultura y Deporte (TIN2014-57364-C2-1-R,TIN2016-80250-R) | Agència de Gestió d’Ajuts Universitaris i de Recerca (2014 SGR 537)

Authors: Oriol Farràs | Jordi Ribes-González

A trust management scheme for IoT-enabled environmental health/accessibility monitoring services

JOURNAL ARTICLE published February 2020 in International Journal of Information Security

Authors: Behshid Shayesteh | Vesal Hakami | Ahmad Akbari

Formal modeling and automatic enforcement of Bring Your Own Device policies

JOURNAL ARTICLE published April 2015 in International Journal of Information Security

Authors: Alessandro Armando | Gabriele Costa | Alessio Merlo | Luca Verderame

Highly private blockchain-based management system for digital COVID-19 certificates

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Authors: Rosa Pericàs-Gornals | Macià Mut-Puigserver | M. Magdalena Payeras-Capellà

Secure universal designated verifier signature without random oracles

JOURNAL ARTICLE published June 2008 in International Journal of Information Security

Authors: Xinyi Huang | Willy Susilo | Yi Mu | Wei Wu

The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Nasour Bagheri | Praveen Gauravaram | Lars R. Knudsen | Erik Zenner