Facet browsing currently unavailable
Page 2 of 930 results
Sort by: relevance publication year
Authenticating mobile phone users using keystroke analysis JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks JOURNAL ARTICLE published 29 April 2024 in International Journal of Information Security |
Perceptual hash function for scalable video JOURNAL ARTICLE published February 2014 in International Journal of Information Security |
Integrating identity-based and certificate-based authenticated key exchange protocols JOURNAL ARTICLE published August 2011 in International Journal of Information Security |
Distributed star coloring of network for IP traceback JOURNAL ARTICLE published June 2018 in International Journal of Information Security |
Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more JOURNAL ARTICLE published February 2016 in International Journal of Information Security |
Preface to the special issue on PKI JOURNAL ARTICLE published January 2004 in International Journal of Information Security |
Editorial JOURNAL ARTICLE published April 2008 in International Journal of Information Security |
Security analysis of CRT-based cryptosystems JOURNAL ARTICLE published July 2006 in International Journal of Information Security |
Data minimisation in communication protocols: a formal analysis framework and application to identity management JOURNAL ARTICLE published November 2014 in International Journal of Information Security |
Static use-based object confinement JOURNAL ARTICLE published February 2005 in International Journal of Information Security |
A new strong security model for stateful authenticated group key exchange JOURNAL ARTICLE published August 2018 in International Journal of Information Security Research funded by National Natural Science Foundation of China (61503052,11547148) | Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJ1500918) | National Natural Science Foundation of China (11647097) | Ministry of Education of the People’s Republic of China (16YJC870018) | Luonnontieteiden ja Tekniikan Tutkimuksen Toimikunta (303578) | Ministry of Education of the People’s Republic of China (15YJC790061,16JDSZ2019) | Scientic and Technological Research Program of Chongqing Municipal Education Com- mission (KJ1600928) |
Content-based filtering of Web documents: the MaX system and the EUFORBIA project JOURNAL ARTICLE published November 2003 in International Journal of Information Security |
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage JOURNAL ARTICLE published August 2015 in International Journal of Information Security |
Selfish mining attack in blockchain: a systematic literature review JOURNAL ARTICLE published 10 April 2024 in International Journal of Information Security |
An SSH predictive model using machine learning with web proxy session logs JOURNAL ARTICLE published April 2022 in International Journal of Information Security |
On the analysis of time-aware protocols in universal composability framework JOURNAL ARTICLE published August 2016 in International Journal of Information Security |
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection JOURNAL ARTICLE published October 2011 in International Journal of Information Security |
Preface to the special issue on Security in global computing JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network JOURNAL ARTICLE published November 2012 in International Journal of Information Security |