Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 927 results
Sort by: relevance publication year

Generic construction of an $$mathrm {eCK}$$ eCK -secure key exchange protocol in the standard model

JOURNAL ARTICLE published October 2017 in International Journal of Information Security

Authors: Janaka Alawatugoda

Activity-based payments: alternative (anonymous) online payment model

JOURNAL ARTICLE published 3 February 2024 in International Journal of Information Security

Authors: Rafał Leszczyna

Preface

JOURNAL ARTICLE published January 2008 in International Journal of Information Security

Authors: Pierpaolo Degano | Luca Viganò

Preface

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

KAMU: providing advanced user privacy in Kerberos multi-domain scenarios

JOURNAL ARTICLE published November 2013 in International Journal of Information Security

Authors: F. Pereñíguez-García | R. Marín-López | G. Kambourakis | A. Ruiz-Martínez | S. Gritzalis | A. F. Skarmeta-Gómez

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

JOURNAL ARTICLE published August 2015 in International Journal of Information Security

Authors: Yong Yu | Man Ho Au | Yi Mu | Shaohua Tang | Jian Ren | Willy Susilo | Liju Dong

Selfish mining attack in blockchain: a systematic literature review

JOURNAL ARTICLE published 10 April 2024 in International Journal of Information Security

Authors: Nadisha Madhushanie | Sugandima Vidanagamachchi | Nalin Arachchilage

A certificateless approach to onion routing

JOURNAL ARTICLE published June 2017 in International Journal of Information Security

Authors: Dario Catalano | Dario Fiore | Rosario Gennaro

Secure and efficient anonymization of distributed confidential databases

JOURNAL ARTICLE published November 2014 in International Journal of Information Security

Authors: Javier Herranz | Jordi Nin

Protocols useful on the Internet from distributed signature schemes

JOURNAL ARTICLE published November 2004 in International Journal of Information Security

Authors: Vanesa Daza | Javier Herranz | Germán Sáez

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: Ed Dawson | Kapali Viswanathan | Colin Boyd

Selecting parameters for secure McEliece-based cryptosystems

JOURNAL ARTICLE published June 2012 in International Journal of Information Security

Authors: Robert Niebuhr | Mohammed Meziani | Stanislav Bulygin | Johannes Buchmann

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Research funded by National Basic Research Program of China (973 Program) (NO. 2012CB315901)

Authors: Hongyong Jia | Yue Chen | Julong Lan | Kaixiang Huang | Jun Wang

TENET: a new hybrid network architecture for adversarial defense

JOURNAL ARTICLE published August 2023 in International Journal of Information Security

Authors: Omer Faruk Tuna | Ferhat Ozgur Catak | M. Taner Eskil

Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security

JOURNAL ARTICLE published October 2006 in International Journal of Information Security

Authors: Lan Nguyen | Rei Safavi-Naini | Kaoru Kurosawa

Theory and benefits of recursive certificate structures

JOURNAL ARTICLE published January 2004 in International Journal of Information Security

Authors: Selwyn Russell

On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem

JOURNAL ARTICLE published April 2013 in International Journal of Information Security

Authors: Panagiotis Rizomiliotis | Stefanos Gritzalis

Perceptual hash function for scalable video

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Navajit Saikia | Prabin K. Bora

A method for identifying Web applications

JOURNAL ARTICLE published December 2009 in International Journal of Information Security

Authors: Mario Kozina | Marin Golub | Stjepan Groš

Flexible adversary disclosure risk measure for identity and attribute disclosure attacks

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Authors: Marmar Orooji | Seyedeh Shaghayegh Rabbanian | Gerald M. Knapp