Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 928 results
Sort by: relevance publication year

AAnA: Anonymous authentication and authorization based on short traceable signatures

JOURNAL ARTICLE published October 2014 in International Journal of Information Security

Authors: Sooyeon Shin | Taekyoung Kwon

Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture

JOURNAL ARTICLE published April 2009 in International Journal of Information Security

Authors: Kalid Elmufti | Dasun Weerasinghe | M. Rajarajan | Veselin Rakocevic | Sanowar Khan | John A. MacDonald

Two-factor authentication for the Bitcoin protocol

JOURNAL ARTICLE published April 2017 in International Journal of Information Security

Authors: Christopher Mann | Daniel Loebenberger

Key pre-distribution approach using block LU decomposition in wireless sensor network

JOURNAL ARTICLE published October 2020 in International Journal of Information Security

Authors: Ahmed M. Manasrah | Areej R. AL-Rabadi | Najib A. Kofahi

A pairing-based cryptographic approach for data security in the cloud

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Authors: Miguel Morales-Sandoval | Jose Luis Gonzalez-Compean | Arturo Diaz-Perez | Victor J. Sosa-Sosa

Privacy-preserving smart metering revisited

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Authors: Alfredo Rial | George Danezis | Markulf Kohlweiss

Temporarily hidden bit commitment and lottery applications

JOURNAL ARTICLE published February 2010 in International Journal of Information Security

Authors: David M. Goldschlag | Stuart G. Stubblebine | Paul F. Syverson

Achieving dynamicity in security policies enforcement using aspects

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Authors: Samiha Ayed | Muhammad Sabir Idrees | Nora Cuppens | Frederic Cuppens

Secure pay-TV for chained hotels

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Research funded by National Key Basic Research Program (973 program) (2012CB315905) | National Natural Science Foundation of China (CN) (61370190) | Natural Science Foundation of Jilin Province (CN) (61472029,61472429) | Natural Science Foundation of China (61472083) | Beijing Natural Science Foundation (4132056,4122041) | Research Funds of Renmin University of China (14XNLF02)

Authors: Hua Deng | Yunya Zhou | Qianhong Wu | Bo Qin | Jianwei Liu

Enhancing grid security by fine-grained behavioral control and negotiation-based authorization

JOURNAL ARTICLE published August 2009 in International Journal of Information Security

Authors: Hristo Koshutanski | Aliaksandr Lazouski | Fabio Martinelli | Paolo Mori

Pepal: Penalizing multimedia breaches and partial leakages

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Research funded by National Science Foundation (CNS-1846316)

Authors: Easwar Vivek Mangipudi | Krutarth Rao | Jeremy Clark | Aniket Kate

Cyber–physical risk assessment for false data injection attacks considering moving target defences

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Research funded by ESRC (S/T000112/1) | Engineering and Physical Sciences Research Council (EP/L015471/1) | Italian Ministry for Research (2017YKXYXJ)

Authors: Martin Higgins | Wangkun Xu | Fei Teng | Thomas Parisini

An integrated deep learning model for Ethereum smart contract vulnerability detection

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Vikas Kumar Jain | Meenakshi Tripathi

A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets

JOURNAL ARTICLE published February 2017 in International Journal of Information Security

Authors: Riaz Ahmed Shaikh | Kamel Adi | Luigi Logrippo

Preface

JOURNAL ARTICLE published April 2006 in International Journal of Information Security

Authors: Jianying Zhou | Javier Lopez

The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Research funded by H2020 Societal Challenges (740829)

Authors: Vasileios Vlachos | Yannis C. Stamatiou | Pantelis Tzamalis | Sotiris Nikoletseas

A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Alejandro Pérez-Méndez | Fernando Pereñíguez-García | Rafael Marín-López | Gabriel López-Millán

Distributed star coloring of network for IP traceback

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Sangita Roy | Ashok Singh Sairam

Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks

JOURNAL ARTICLE published November 2011 in International Journal of Information Security

Authors: Josep M. Miret | Francesc Sebé

Passive-attack analysis for connection-based anonymity systems

JOURNAL ARTICLE published June 2005 in International Journal of Information Security

Authors: Andrei Serjantov | Peter Sewell