Facet browsing currently unavailable
Page 2 of 929 results
Sort by: relevance publication year
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Preface to the special issue on PKI JOURNAL ARTICLE published January 2004 in International Journal of Information Security |
Editorial JOURNAL ARTICLE published April 2008 in International Journal of Information Security |
Security analysis of CRT-based cryptosystems JOURNAL ARTICLE published July 2006 in International Journal of Information Security |
Sufficient conditions for sound tree and sequential hashing modes JOURNAL ARTICLE published August 2014 in International Journal of Information Security |
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
A new strong security model for stateful authenticated group key exchange JOURNAL ARTICLE published August 2018 in International Journal of Information Security Research funded by National Natural Science Foundation of China (61503052,11547148) | Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJ1500918) | National Natural Science Foundation of China (11647097) | Ministry of Education of the People’s Republic of China (16YJC870018) | Luonnontieteiden ja Tekniikan Tutkimuksen Toimikunta (303578) | Ministry of Education of the People’s Republic of China (15YJC790061,16JDSZ2019) | Scientic and Technological Research Program of Chongqing Municipal Education Com- mission (KJ1600928) |
Content-based filtering of Web documents: the MaX system and the EUFORBIA project JOURNAL ARTICLE published November 2003 in International Journal of Information Security |
Resolving privacy-preserving relationships over outsourced encrypted data storages JOURNAL ARTICLE published April 2016 in International Journal of Information Security |
RORI-based countermeasure selection using the OrBAC formalism JOURNAL ARTICLE published February 2014 in International Journal of Information Security |
Using ambients to control resources JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
ASICS: authenticated key exchange security incorporating certification systems JOURNAL ARTICLE published April 2017 in International Journal of Information Security |
Static use-based object confinement JOURNAL ARTICLE published February 2005 in International Journal of Information Security |
New constructions of OSBE schemes and their applications in oblivious access control JOURNAL ARTICLE published November 2012 in International Journal of Information Security |
An SSH predictive model using machine learning with web proxy session logs JOURNAL ARTICLE published April 2022 in International Journal of Information Security |
On the analysis of time-aware protocols in universal composability framework JOURNAL ARTICLE published August 2016 in International Journal of Information Security |
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection JOURNAL ARTICLE published October 2011 in International Journal of Information Security |
Preface to the special issue on Security in global computing JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
PolicyUpdater: a system for dynamic access control JOURNAL ARTICLE published July 2006 in International Journal of Information Security |
AAnA: Anonymous authentication and authorization based on short traceable signatures JOURNAL ARTICLE published October 2014 in International Journal of Information Security |