Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 930 results
Sort by: relevance publication year

Authenticating mobile phone users using keystroke analysis

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: N. L. Clarke | S. M. Furnell

C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks

JOURNAL ARTICLE published 29 April 2024 in International Journal of Information Security

Authors: Raja Zeeshan Haider | Baber Aslam | Haider Abbas | Zafar Iqbal

Perceptual hash function for scalable video

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Navajit Saikia | Prabin K. Bora

Integrating identity-based and certificate-based authenticated key exchange protocols

JOURNAL ARTICLE published August 2011 in International Journal of Information Security

Authors: Berkant Ustaoğlu

Distributed star coloring of network for IP traceback

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Sangita Roy | Ashok Singh Sairam

Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more

JOURNAL ARTICLE published February 2016 in International Journal of Information Security

Authors: Yu Chen | Qiong Huang | Zongyang Zhang

Preface to the special issue on PKI

JOURNAL ARTICLE published January 2004 in International Journal of Information Security

Authors: E. Dawson

Editorial

JOURNAL ARTICLE published April 2008 in International Journal of Information Security

Authors: Dieter Gollmann

Security analysis of CRT-based cryptosystems

JOURNAL ARTICLE published July 2006 in International Journal of Information Security

Authors: Katsuyuki Okeya | Tsuyoshi Takagi

Data minimisation in communication protocols: a formal analysis framework and application to identity management

JOURNAL ARTICLE published November 2014 in International Journal of Information Security

Authors: Meilof Veeningen | Benne de Weger | Nicola Zannone

Static use-based object confinement

JOURNAL ARTICLE published February 2005 in International Journal of Information Security

Authors: Christian Skalka | Scott Smith

A new strong security model for stateful authenticated group key exchange

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (61503052,11547148) | Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJ1500918) | National Natural Science Foundation of China (11647097) | Ministry of Education of the People’s Republic of China (16YJC870018) | Luonnontieteiden ja Tekniikan Tutkimuksen Toimikunta (303578) | Ministry of Education of the People’s Republic of China (15YJC790061,16JDSZ2019) | Scientic and Technological Research Program of Chongqing Municipal Education Com- mission (KJ1600928)

Authors: Zheng Yang | Chao Liu | Wanping Liu | Daigu Zhang | Song Luo

Content-based filtering of Web documents: the MaX system and the EUFORBIA project

JOURNAL ARTICLE published November 2003 in International Journal of Information Security

Authors: Elisa Bertino | Elena Ferrari | Andrea Perego

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

JOURNAL ARTICLE published August 2015 in International Journal of Information Security

Authors: Yong Yu | Man Ho Au | Yi Mu | Shaohua Tang | Jian Ren | Willy Susilo | Liju Dong

Selfish mining attack in blockchain: a systematic literature review

JOURNAL ARTICLE published 10 April 2024 in International Journal of Information Security

Authors: Nadisha Madhushanie | Sugandima Vidanagamachchi | Nalin Arachchilage

An SSH predictive model using machine learning with web proxy session logs

JOURNAL ARTICLE published April 2022 in International Journal of Information Security

Authors: Junwon Lee | Heejo Lee

On the analysis of time-aware protocols in universal composability framework

JOURNAL ARTICLE published August 2016 in International Journal of Information Security

Authors: István Vajda

CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection

JOURNAL ARTICLE published October 2011 in International Journal of Information Security

Authors: Luciana Marconi | Mauro Conti | Roberto Di Pietro

Preface to the special issue on Security in global computing

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: Corrado Priami

A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Alejandro Pérez-Méndez | Fernando Pereñíguez-García | Rafael Marín-López | Gabriel López-Millán