Facet browsing currently unavailable
Page 5 of 930 results
Sort by: relevance publication year
Alambic: a privacy-preserving recommender system for electronic commerce JOURNAL ARTICLE published October 2008 in International Journal of Information Security |
Privacy preserving data sharing and analysis for edge-based architectures JOURNAL ARTICLE published February 2022 in International Journal of Information Security Research funded by Horizon 2020 Framework Programme (952652) | H2020 Excellent Science (700294) |
On detecting co-resident cloud instances using network flow watermarking techniques JOURNAL ARTICLE published April 2014 in International Journal of Information Security |
Trends in publishing blockchain surveys: a bibliometric perspective JOURNAL ARTICLE published April 2023 in International Journal of Information Security |
Write-only oblivious RAM-based privacy-preserved access of outsourced data JOURNAL ARTICLE published February 2017 in International Journal of Information Security Research funded by Agency for Science, Technology and Research (TSRP 102 158 0038) |
Stack inspection and secure program transformations JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
Dynamic searchable symmetric encryption for storing geospatial data in the cloud JOURNAL ARTICLE published June 2019 in International Journal of Information Security |
You click, I steal: analyzing and detecting click hijacking attacks in web pages JOURNAL ARTICLE published August 2019 in International Journal of Information Security |
Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more JOURNAL ARTICLE published February 2016 in International Journal of Information Security |
A survey on analyzing encrypted network traffic of mobile devices JOURNAL ARTICLE published August 2022 in International Journal of Information Security Research funded by Defence Research and Development Organisation (CARS-46) |
A multi-objective cost–benefit optimization algorithm for network hardening JOURNAL ARTICLE published August 2022 in International Journal of Information Security |
Cryptographically sound security proofs for basic and public-key Kerberos JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
Data minimisation in communication protocols: a formal analysis framework and application to identity management JOURNAL ARTICLE published November 2014 in International Journal of Information Security |
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates JOURNAL ARTICLE published April 2023 in International Journal of Information Security |
Mutual authentications to parties with QR-code applications in mobile systems JOURNAL ARTICLE published October 2017 in International Journal of Information Security Research funded by Ministry of Science and Technology, Taiwan (104-2221-E-015-001,101-2218-E-008-003) | National Central University (Software Research Center) |
JOURNAL ARTICLE published November 2002 in International Journal of Information Security |
K maximum probability attack paths generation algorithm for target nodes in networked systems JOURNAL ARTICLE published August 2021 in International Journal of Information Security Research funded by National Natural Science Foundation of China (61672338,51779136,61873160,61373028) |
Privacy-preserving continuous authentication using behavioral biometrics JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
An attack on the isomorphisms of polynomials problem with one secret JOURNAL ARTICLE published November 2003 in International Journal of Information Security |