Facet browsing currently unavailable
Page 3 of 928 results
Sort by: relevance publication year
AAnA: Anonymous authentication and authorization based on short traceable signatures JOURNAL ARTICLE published October 2014 in International Journal of Information Security |
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture JOURNAL ARTICLE published April 2009 in International Journal of Information Security |
Two-factor authentication for the Bitcoin protocol JOURNAL ARTICLE published April 2017 in International Journal of Information Security |
Key pre-distribution approach using block LU decomposition in wireless sensor network JOURNAL ARTICLE published October 2020 in International Journal of Information Security |
A pairing-based cryptographic approach for data security in the cloud JOURNAL ARTICLE published August 2018 in International Journal of Information Security |
Privacy-preserving smart metering revisited JOURNAL ARTICLE published February 2018 in International Journal of Information Security |
Temporarily hidden bit commitment and lottery applications JOURNAL ARTICLE published February 2010 in International Journal of Information Security |
Achieving dynamicity in security policies enforcement using aspects JOURNAL ARTICLE published February 2018 in International Journal of Information Security |
Secure pay-TV for chained hotels JOURNAL ARTICLE published February 2018 in International Journal of Information Security Research funded by National Key Basic Research Program (973 program) (2012CB315905) | National Natural Science Foundation of China (CN) (61370190) | Natural Science Foundation of Jilin Province (CN) (61472029,61472429) | Natural Science Foundation of China (61472083) | Beijing Natural Science Foundation (4132056,4122041) | Research Funds of Renmin University of China (14XNLF02) |
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization JOURNAL ARTICLE published August 2009 in International Journal of Information Security |
Pepal: Penalizing multimedia breaches and partial leakages JOURNAL ARTICLE published February 2024 in International Journal of Information Security Research funded by National Science Foundation (CNS-1846316) |
Cyber–physical risk assessment for false data injection attacks considering moving target defences JOURNAL ARTICLE published June 2023 in International Journal of Information Security Research funded by ESRC (S/T000112/1) | Engineering and Physical Sciences Research Council (EP/L015471/1) | Italian Ministry for Research (2017YKXYXJ) |
An integrated deep learning model for Ethereum smart contract vulnerability detection JOURNAL ARTICLE published February 2024 in International Journal of Information Security |
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets JOURNAL ARTICLE published February 2017 in International Journal of Information Security |
Preface JOURNAL ARTICLE published April 2006 in International Journal of Information Security |
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats JOURNAL ARTICLE published October 2022 in International Journal of Information Security Research funded by H2020 Societal Challenges (740829) |
A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network JOURNAL ARTICLE published November 2012 in International Journal of Information Security |
Distributed star coloring of network for IP traceback JOURNAL ARTICLE published June 2018 in International Journal of Information Security |
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Passive-attack analysis for connection-based anonymity systems JOURNAL ARTICLE published June 2005 in International Journal of Information Security |