Facet browsing currently unavailable
Page 4 of 930 results
Sort by: relevance publication year
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats JOURNAL ARTICLE published October 2022 in International Journal of Information Security Research funded by H2020 Societal Challenges (740829) |
A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network JOURNAL ARTICLE published November 2012 in International Journal of Information Security |
Distributed star coloring of network for IP traceback JOURNAL ARTICLE published June 2018 in International Journal of Information Security |
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Passive-attack analysis for connection-based anonymity systems JOURNAL ARTICLE published June 2005 in International Journal of Information Security |
Challenges of post-quantum digital signing in real-world applications: a survey JOURNAL ARTICLE published August 2022 in International Journal of Information Security Research funded by Ministry of Education (MOE2018-T2-1-111) |
Random dictatorship for privacy-preserving social choice JOURNAL ARTICLE published October 2020 in International Journal of Information Security Research funded by Vetenskapsrådet (VR 2016-03346) |
Efficient identity-based online/offline encryption and signcryption with short ciphertext JOURNAL ARTICLE published June 2017 in International Journal of Information Security |
A novel two-level secure access control approach for blockchain platform in healthcare JOURNAL ARTICLE published August 2023 in International Journal of Information Security |
A review on fake news detection 3T’s: typology, time of detection, taxonomies JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
A practical privacy-preserving targeted advertising scheme for IPTV users JOURNAL ARTICLE published August 2016 in International Journal of Information Security Research funded by TurkTelekom (3014-02) |
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage JOURNAL ARTICLE published February 2013 in International Journal of Information Security |
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management JOURNAL ARTICLE published June 2018 in International Journal of Information Security |
Authenticating mobile phone users using keystroke analysis JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |
A content-based deep intrusion detection system JOURNAL ARTICLE published June 2022 in International Journal of Information Security |
Generalizing cryptosystems based on the subset sum problem JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
Enhanced GeoProof: improved geographic assurance for data in the cloud JOURNAL ARTICLE published April 2014 in International Journal of Information Security |
Zheng and Seberry’s public key encryption scheme revisited JOURNAL ARTICLE published November 2003 in International Journal of Information Security |
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
Minimizing TTP's involvement in signature validation JOURNAL ARTICLE published January 2006 in International Journal of Information Security |