Facet browsing currently unavailable
Page 1 of 933 results
Sort by: relevance publication year
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
Message from the Guest Editors JOURNAL ARTICLE published October 2012 in International Journal of Information Security |
Defeating SQL injection attack in authentication security: an experimental study JOURNAL ARTICLE published February 2019 in International Journal of Information Security |
An extended access control mechanism exploiting data dependencies JOURNAL ARTICLE published February 2017 in International Journal of Information Security |
Aggregate message authentication codes (AMACs) with on-the-fly verification JOURNAL ARTICLE published November 2013 in International Journal of Information Security |
An intrusion detection and prevention system for IMS and VoIP services JOURNAL ARTICLE published June 2013 in International Journal of Information Security |
Minimizing information disclosure to third parties in social login platforms JOURNAL ARTICLE published October 2012 in International Journal of Information Security |
Studying lattice reduction algorithms improved by quick reordering technique JOURNAL ARTICLE published April 2021 in International Journal of Information Security Research funded by Japan Society for the Promotion of Science (JP17J01987) | Core Research for Evolutional Science and Technology (JPMJCR14D6) |
Fujisaki–Okamoto hybrid encryption revisited JOURNAL ARTICLE published October 2005 in International Journal of Information Security |
Secure and collusion-resistant data aggregation from convertible tags JOURNAL ARTICLE published February 2021 in International Journal of Information Security |
Probabilistic timing covert channels: to close or not to close? JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
Access right management by extended password capabilities JOURNAL ARTICLE published October 2018 in International Journal of Information Security Research funded by Italian Ministry of Education, University and Research (20103P34XC_008) |
A new hardware-assisted PIR with O(n) shuffle cost JOURNAL ARTICLE published August 2010 in International Journal of Information Security |
Reactively secure signature schemes JOURNAL ARTICLE published October 2005 in International Journal of Information Security |
A new probabilistic rekeying method for secure multicast groups JOURNAL ARTICLE published August 2010 in International Journal of Information Security |
Track for surveys JOURNAL ARTICLE published February 2022 in International Journal of Information Security |
After you, please: browser extensions order attacks and countermeasures JOURNAL ARTICLE published December 2020 in International Journal of Information Security Research funded by Vetenskapsrådet (2015-04154) | Ministerio de Economía, Industria y Competitividad, Gobierno de España (TIN2016-79095-C2-2-R) | Comunidad de Madrid (S2013/ICE-3095) |
Anonymity and everlasting privacy in electronic voting JOURNAL ARTICLE published August 2023 in International Journal of Information Security |
A wrinkle in time: a case study in DNS poisoning JOURNAL ARTICLE published June 2021 in International Journal of Information Security |
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy JOURNAL ARTICLE published April 2019 in International Journal of Information Security Research funded by National Natural Science Foundation of China (U1405251) |