Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 928 results
Sort by: relevance publication year

Efficient generation of secure elliptic curves

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: Elisavet Konstantinou | Yannis C. Stamatiou | Christos Zaroliagis

TrUStAPIS: a trust requirements elicitation method for IoT

JOURNAL ARTICLE published February 2020 in International Journal of Information Security

Research funded by H2020 Marie Skłodowska-Curie Actions (675320) | Horizon 2020 (830929) | Agencia Estatal de Investigación (TIN2016-79095-C2-1-R)

Authors: Davide Ferraris | Carmen Fernandez-Gago

An analysis of accuracy experiments carried out over of a multi-faceted model of trust

JOURNAL ARTICLE published April 2009 in International Journal of Information Security

Authors: Karl Quinn | David Lewis | Declan O’Sullivan | Vincent P. Wade

International Journal of Information Security

JOURNAL published

Toward a secure Kerberos key exchange with smart cards

JOURNAL ARTICLE published June 2014 in International Journal of Information Security

Authors: Nikos Mavrogiannopoulos | Andreas Pashalidis | Bart Preneel

Management of access control policies for XML document sources

JOURNAL ARTICLE published July 2003 in International Journal of Information Security

Authors: Barbara Carminati | Elena Ferrari

Developing non-interactive MPC with trusted hardware for enhanced security

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Authors: Ryan Karl | Hannah Burchfield | Jonathan Takeshita | Taeho Jung

Preventing sensitive relationships disclosure for better social media preservation

JOURNAL ARTICLE published April 2016 in International Journal of Information Security

Authors: Elie Raad | Bechara Al Bouna | Richard Chbeir

Generic constructions for role-based encryption

JOURNAL ARTICLE published October 2015 in International Journal of Information Security

Authors: Lan Zhou | Vijay Varadharajan | Michael Hitchens

Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity

JOURNAL ARTICLE published August 2015 in International Journal of Information Security

Authors: Abdeljebar Ameziane El Hassani | Anas Abou El Kalam | Adel Bouhoula | Ryma Abassi | Abdellah Ait Ouahman

Distributing security-mediated PKI

JOURNAL ARTICLE published January 2006 in International Journal of Information Security

Authors: Gabriel Vanrenen | Sean Smith | John Marchesini

Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext

JOURNAL ARTICLE published April 2021 in International Journal of Information Security

Research funded by National Research Foundation Singapore (NRF2014NCR-NCR001-31)

Authors: Jia Xu | Jianying Zhou

HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms

JOURNAL ARTICLE published August 2017 in International Journal of Information Security

Authors: Raghav V. Sampangi | Srinivas Sampalli

Generalized Elias schemes for efficient harvesting of truly random bits

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Authors: Riccardo Bernardini | Roberto Rinaldo

FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices

JOURNAL ARTICLE published December 2020 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (61972017,61972018) | National Natural Science Foundation of China (61932014) | Beijing Natural Science Foundation (4182033) | National Cryptography Development Fund (MMJJ20180215)

Authors: Yanting Zhang | Jianwei Liu | Zongyang Zhang | Weiran Liu

Multi-operator wireless mesh networks secured by an all-encompassing security architecture

JOURNAL ARTICLE published April 2015 in International Journal of Information Security

Authors: André Egners | Patrick Herrmann | Ulrike Meyer

Bayesian rational exchange

JOURNAL ARTICLE published January 2008 in International Journal of Information Security

Authors: Juan M. Estevez-Tapiador | Almudena Alcaide | Julio C. Hernandez-Castro | Arturo Ribagorda

Tuning a two-round group key agreement

JOURNAL ARTICLE published October 2014 in International Journal of Information Security

Authors: Weizheng Gao | Kashi Neupane | Rainer Steinwandt

Multi-device anonymous authentication

JOURNAL ARTICLE published April 2019 in International Journal of Information Security

Research funded by Narodowe Centrum Nauki (2014/15/N/ST6/04655)

Authors: Kamil Kluczniak | Jianfeng Wang | Xiaofeng Chen | Mirosław Kutyłowski

BASPED: Blockchain assisted searchable public key encryption over outsourced data

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Partha Sarathi Chakraborty | Somanath Tripathy | Sanjeet Kumar Nayak