Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 929 results
Sort by: relevance publication year

A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Reza Mohammadi

Preface to the special issue on PKI

JOURNAL ARTICLE published January 2004 in International Journal of Information Security

Authors: E. Dawson

Editorial

JOURNAL ARTICLE published April 2008 in International Journal of Information Security

Authors: Dieter Gollmann

Security analysis of CRT-based cryptosystems

JOURNAL ARTICLE published July 2006 in International Journal of Information Security

Authors: Katsuyuki Okeya | Tsuyoshi Takagi

Sufficient conditions for sound tree and sequential hashing modes

JOURNAL ARTICLE published August 2014 in International Journal of Information Security

Authors: Guido Bertoni | Joan Daemen | Michaël Peeters | Gilles Van Assche

Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Gulab Sah | Subhasish Banerjee | Sweety Singh

A new strong security model for stateful authenticated group key exchange

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (61503052,11547148) | Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJ1500918) | National Natural Science Foundation of China (11647097) | Ministry of Education of the People’s Republic of China (16YJC870018) | Luonnontieteiden ja Tekniikan Tutkimuksen Toimikunta (303578) | Ministry of Education of the People’s Republic of China (15YJC790061,16JDSZ2019) | Scientic and Technological Research Program of Chongqing Municipal Education Com- mission (KJ1600928)

Authors: Zheng Yang | Chao Liu | Wanping Liu | Daigu Zhang | Song Luo

Content-based filtering of Web documents: the MaX system and the EUFORBIA project

JOURNAL ARTICLE published November 2003 in International Journal of Information Security

Authors: Elisa Bertino | Elena Ferrari | Andrea Perego

Resolving privacy-preserving relationships over outsourced encrypted data storages

JOURNAL ARTICLE published April 2016 in International Journal of Information Security

Authors: Alberto Huertas Celdrán | Ginés Dólera Tormo | Félix Gómez Mármol | Manuel Gil Pérez | Gregorio Martínez Pérez

RORI-based countermeasure selection using the OrBAC formalism

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Gustavo Gonzalez Granadillo | Malek Belhaouane | Hervé Debar | Grégoire Jacob

Using ambients to control resources

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: David Teller | Pascal Zimmer | Daniel Hirschkoff

ASICS: authenticated key exchange security incorporating certification systems

JOURNAL ARTICLE published April 2017 in International Journal of Information Security

Authors: Colin Boyd | Cas Cremers | Michèle Feltz | Kenneth G. Paterson | Bertram Poettering | Douglas Stebila

Static use-based object confinement

JOURNAL ARTICLE published February 2005 in International Journal of Information Security

Authors: Christian Skalka | Scott Smith

New constructions of OSBE schemes and their applications in oblivious access control

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Jinguang Han | Willy Susilo | Yi Mu | Jun Yan

An SSH predictive model using machine learning with web proxy session logs

JOURNAL ARTICLE published April 2022 in International Journal of Information Security

Authors: Junwon Lee | Heejo Lee

On the analysis of time-aware protocols in universal composability framework

JOURNAL ARTICLE published August 2016 in International Journal of Information Security

Authors: István Vajda

CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection

JOURNAL ARTICLE published October 2011 in International Journal of Information Security

Authors: Luciana Marconi | Mauro Conti | Roberto Di Pietro

Preface to the special issue on Security in global computing

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: Corrado Priami

PolicyUpdater: a system for dynamic access control

JOURNAL ARTICLE published July 2006 in International Journal of Information Security

Authors: Vino Fernando Crescini | Yan Zhang

AAnA: Anonymous authentication and authorization based on short traceable signatures

JOURNAL ARTICLE published October 2014 in International Journal of Information Security

Authors: Sooyeon Shin | Taekyoung Kwon