Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 930 results
Sort by: relevance publication year

Alambic: a privacy-preserving recommender system for electronic commerce

JOURNAL ARTICLE published October 2008 in International Journal of Information Security

Authors: Esma Aïmeur | Gilles Brassard | José M. Fernandez | Flavien Serge Mani Onana

Privacy preserving data sharing and analysis for edge-based architectures

JOURNAL ARTICLE published February 2022 in International Journal of Information Security

Research funded by Horizon 2020 Framework Programme (952652) | H2020 Excellent Science (700294)

Authors: Mina Sheikhalishahi | Andrea Saracino | Fabio Martinelli | Antonio La Marra

On detecting co-resident cloud instances using network flow watermarking techniques

JOURNAL ARTICLE published April 2014 in International Journal of Information Security

Authors: Adam Bates | Benjamin Mood | Joe Pletcher | Hannah Pruse | Masoud Valafar | Kevin Butler

Trends in publishing blockchain surveys: a bibliometric perspective

JOURNAL ARTICLE published April 2023 in International Journal of Information Security

Authors: Hira Ahmad | Muhammad Ahtazaz Ahsan | Adnan Noor Mian

Write-only oblivious RAM-based privacy-preserved access of outsourced data

JOURNAL ARTICLE published February 2017 in International Journal of Information Security

Research funded by Agency for Science, Technology and Research (TSRP 102 158 0038)

Authors: Lichun Li | Anwitaman Datta

Stack inspection and secure program transformations

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: Massimo Bartoletti | Pierpaolo Degano | Gian Luigi Ferrari

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: E. Damiani | S. De Capitani di Vimercati | S. Paraboschi | P. Samarati

Dynamic searchable symmetric encryption for storing geospatial data in the cloud

JOURNAL ARTICLE published June 2019 in International Journal of Information Security

Authors: Benedikt Hiemenz | Michel Krämer

You click, I steal: analyzing and detecting click hijacking attacks in web pages

JOURNAL ARTICLE published August 2019 in International Journal of Information Security

Authors: Anil Saini | Manoj Singh Gaur | Vijay Laxmi | Mauro Conti

Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more

JOURNAL ARTICLE published February 2016 in International Journal of Information Security

Authors: Yu Chen | Qiong Huang | Zongyang Zhang

A survey on analyzing encrypted network traffic of mobile devices

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Research funded by Defence Research and Development Organisation (CARS-46)

Authors: Ankit Agrawal | Ashutosh Bhatia | Ayush Bahuguna | Kamlesh Tiwari | K. Haribabu | Deepak Vishwakarma | Rekha Kaushik

A multi-objective cost–benefit optimization algorithm for network hardening

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Authors: Kengo Zenitani

Cryptographically sound security proofs for basic and public-key Kerberos

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

Authors: Michael Backes | Iliano Cervesato | Aaron D. Jaggard | Andre Scedrov | Joe-Kai Tsay

Data minimisation in communication protocols: a formal analysis framework and application to identity management

JOURNAL ARTICLE published November 2014 in International Journal of Information Security

Authors: Meilof Veeningen | Benne de Weger | Nicola Zannone

How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates

JOURNAL ARTICLE published April 2023 in International Journal of Information Security

Authors: Qin An | Wilson Cheong Hin Hong | XiaoShu Xu | Yunfeng Zhang | Kimberly Kolletar-Zhu

Mutual authentications to parties with QR-code applications in mobile systems

JOURNAL ARTICLE published October 2017 in International Journal of Information Security

Research funded by Ministry of Science and Technology, Taiwan (104-2221-E-015-001,101-2218-E-008-003) | National Central University (Software Research Center)

Authors: Cheng-Ta Huang | Yu-Hong Zhang | Li-Chiun Lin | Wei-Jen Wang | Shiuh-Jeng Wang

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: J.M. Gonzáles Nieto | K. Viswanathan | C. Boyd | A. Clark | E. Dawson

K maximum probability attack paths generation algorithm for target nodes in networked systems

JOURNAL ARTICLE published August 2021 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (61672338,51779136,61873160,61373028)

Authors: Kun Bi | Dezhi Han | Guichen Zhang | Kuan-Ching Li | Aniello Castiglione

Privacy-preserving continuous authentication using behavioral biometrics

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Ahmed Fraz Baig | Sigurd Eskeland | Bian Yang

An attack on the isomorphisms of polynomials problem with one secret

JOURNAL ARTICLE published November 2003 in International Journal of Information Security

Authors: Willi Geiselmann | Willi Meier | Rainer Steinwandt