Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 930 results
Sort by: relevance publication year

The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Research funded by H2020 Societal Challenges (740829)

Authors: Vasileios Vlachos | Yannis C. Stamatiou | Pantelis Tzamalis | Sotiris Nikoletseas

A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Alejandro Pérez-Méndez | Fernando Pereñíguez-García | Rafael Marín-López | Gabriel López-Millán

Distributed star coloring of network for IP traceback

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Sangita Roy | Ashok Singh Sairam

Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks

JOURNAL ARTICLE published November 2011 in International Journal of Information Security

Authors: Josep M. Miret | Francesc Sebé

Passive-attack analysis for connection-based anonymity systems

JOURNAL ARTICLE published June 2005 in International Journal of Information Security

Authors: Andrei Serjantov | Peter Sewell

Challenges of post-quantum digital signing in real-world applications: a survey

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Research funded by Ministry of Education (MOE2018-T2-1-111)

Authors: Teik Guan Tan | Pawel Szalachowski | Jianying Zhou

Random dictatorship for privacy-preserving social choice

JOURNAL ARTICLE published October 2020 in International Journal of Information Security

Research funded by Vetenskapsrådet (VR 2016-03346)

Authors: Vicenç Torra

Efficient identity-based online/offline encryption and signcryption with short ciphertext

JOURNAL ARTICLE published June 2017 in International Journal of Information Security

Authors: Jianchang Lai | Yi Mu | Fuchun Guo

A novel two-level secure access control approach for blockchain platform in healthcare

JOURNAL ARTICLE published August 2023 in International Journal of Information Security

Authors: Shweta Mittal | Mohona Ghosh

A review on fake news detection 3T’s: typology, time of detection, taxonomies

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Shubhangi Rastogi | Divya Bansal

A practical privacy-preserving targeted advertising scheme for IPTV users

JOURNAL ARTICLE published August 2016 in International Journal of Information Security

Research funded by TurkTelekom (3014-02)

Authors: Leyli Javid Khayati | Cengiz Orencik | Erkay Savas | Berkant Ustaoglu

Toward tracing and revoking schemes secure against collusion and any form of secret information leakage

JOURNAL ARTICLE published February 2013 in International Journal of Information Security

Authors: Paolo D’Arco | Angel Perez del Pozo

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Yujue Wang | HweeHwa Pang | Robert H. Deng

Authenticating mobile phone users using keystroke analysis

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: N. L. Clarke | S. M. Furnell

A content-based deep intrusion detection system

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: Mahdi Soltani | Mahdi Jafari Siavoshani | Amir Hossein Jahangir

Generalizing cryptosystems based on the subset sum problem

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

Authors: Aniket Kate | Ian Goldberg

Enhanced GeoProof: improved geographic assurance for data in the cloud

JOURNAL ARTICLE published April 2014 in International Journal of Information Security

Authors: Aiiad Albeshri | Colin Boyd | Juan González Nieto

Zheng and Seberry’s public key encryption scheme revisited

JOURNAL ARTICLE published November 2003 in International Journal of Information Security

Authors: Joonsang Baek | Yuliang Zheng

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: Michiharu Kudo

Minimizing TTP's involvement in signature validation

JOURNAL ARTICLE published January 2006 in International Journal of Information Security

Authors: Jianying Zhou | Feng Bao | Robert Deng