Facet browsing currently unavailable
Page 10 of 928 results
Sort by: relevance publication year
Efficient generation of secure elliptic curves JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |
TrUStAPIS: a trust requirements elicitation method for IoT JOURNAL ARTICLE published February 2020 in International Journal of Information Security Research funded by H2020 Marie Skłodowska-Curie Actions (675320) | Horizon 2020 (830929) | Agencia Estatal de Investigación (TIN2016-79095-C2-1-R) |
An analysis of accuracy experiments carried out over of a multi-faceted model of trust JOURNAL ARTICLE published April 2009 in International Journal of Information Security |
International Journal of Information Security JOURNAL published |
Toward a secure Kerberos key exchange with smart cards JOURNAL ARTICLE published June 2014 in International Journal of Information Security |
Management of access control policies for XML document sources JOURNAL ARTICLE published July 2003 in International Journal of Information Security |
Developing non-interactive MPC with trusted hardware for enhanced security JOURNAL ARTICLE published August 2022 in International Journal of Information Security |
Preventing sensitive relationships disclosure for better social media preservation JOURNAL ARTICLE published April 2016 in International Journal of Information Security |
Generic constructions for role-based encryption JOURNAL ARTICLE published October 2015 in International Journal of Information Security |
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity JOURNAL ARTICLE published August 2015 in International Journal of Information Security |
Distributing security-mediated PKI JOURNAL ARTICLE published January 2006 in International Journal of Information Security |
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext JOURNAL ARTICLE published April 2021 in International Journal of Information Security Research funded by National Research Foundation Singapore (NRF2014NCR-NCR001-31) |
HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms JOURNAL ARTICLE published August 2017 in International Journal of Information Security |
Generalized Elias schemes for efficient harvesting of truly random bits JOURNAL ARTICLE published February 2018 in International Journal of Information Security |
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices JOURNAL ARTICLE published December 2020 in International Journal of Information Security Research funded by National Natural Science Foundation of China (61972017,61972018) | National Natural Science Foundation of China (61932014) | Beijing Natural Science Foundation (4182033) | National Cryptography Development Fund (MMJJ20180215) |
Multi-operator wireless mesh networks secured by an all-encompassing security architecture JOURNAL ARTICLE published April 2015 in International Journal of Information Security |
Bayesian rational exchange JOURNAL ARTICLE published January 2008 in International Journal of Information Security |
Tuning a two-round group key agreement JOURNAL ARTICLE published October 2014 in International Journal of Information Security |
Multi-device anonymous authentication JOURNAL ARTICLE published April 2019 in International Journal of Information Security Research funded by Narodowe Centrum Nauki (2014/15/N/ST6/04655) |
BASPED: Blockchain assisted searchable public key encryption over outsourced data JOURNAL ARTICLE published February 2024 in International Journal of Information Security |