Facet browsing currently unavailable
Page 10 of 929 results
Sort by: relevance publication year
Olympus: a GDPR compliant blockchain system JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Locating collaborative attack targets based on physical invariants toward cyber-physical systems JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Uncertain inference control in privacy protection JOURNAL ARTICLE published December 2009 in International Journal of Information Security |
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment JOURNAL ARTICLE published June 2023 in International Journal of Information Security Research funded by The National Natural Science Foundation of China (U1936213) |
A new efficient optimistic fair exchange protocol without random oracles JOURNAL ARTICLE published February 2012 in International Journal of Information Security |
Message from the Guest Editors JOURNAL ARTICLE published October 2011 in International Journal of Information Security |
The functionality-based application confinement model JOURNAL ARTICLE published October 2013 in International Journal of Information Security |
Optimization of parallel firewalls filtering rules JOURNAL ARTICLE published April 2022 in International Journal of Information Security |
Efficient generation of secure elliptic curves JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts JOURNAL ARTICLE published August 2013 in International Journal of Information Security |
An analysis of accuracy experiments carried out over of a multi-faceted model of trust JOURNAL ARTICLE published April 2009 in International Journal of Information Security |
International Journal of Information Security JOURNAL published |
Toward a secure Kerberos key exchange with smart cards JOURNAL ARTICLE published June 2014 in International Journal of Information Security |
Management of access control policies for XML document sources JOURNAL ARTICLE published July 2003 in International Journal of Information Security |
Developing non-interactive MPC with trusted hardware for enhanced security JOURNAL ARTICLE published August 2022 in International Journal of Information Security |
Preventing sensitive relationships disclosure for better social media preservation JOURNAL ARTICLE published April 2016 in International Journal of Information Security |
Generic constructions for role-based encryption JOURNAL ARTICLE published October 2015 in International Journal of Information Security |
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity JOURNAL ARTICLE published August 2015 in International Journal of Information Security |
Distributing security-mediated PKI JOURNAL ARTICLE published January 2006 in International Journal of Information Security |