Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 929 results
Sort by: relevance publication year

Olympus: a GDPR compliant blockchain system

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Ricardo Martins Gonçalves | Miguel Mira da Silva | Paulo Rupino da Cunha

Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Muralidhara Rao Patruni | Abdul Gaffar Humayun

Locating collaborative attack targets based on physical invariants toward cyber-physical systems

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Peng Xun | Ziyu Yang | Haoyang Zhu | Zhu Tang

Uncertain inference control in privacy protection

JOURNAL ARTICLE published December 2009 in International Journal of Information Security

Authors: Xiangdong An | Dawn Jutla | Nick Cercone | Charnyote Pluempitiwiriyawej | Hai Wang

Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Research funded by The National Natural Science Foundation of China (U1936213)

Authors: Yingchun Chen | Jinguo Li | Naiwang Guo

A new efficient optimistic fair exchange protocol without random oracles

JOURNAL ARTICLE published February 2012 in International Journal of Information Security

Authors: Qiong Huang | Guomin Yang | Duncan S. Wong | Willy Susilo

Message from the Guest Editors

JOURNAL ARTICLE published October 2011 in International Journal of Information Security

Authors: Sushil Jajodia | Jianying Zhou

The functionality-based application confinement model

JOURNAL ARTICLE published October 2013 in International Journal of Information Security

Authors: Z. Cliffe Schreuders | Christian Payne | Tanya McGill

Optimization of parallel firewalls filtering rules

JOURNAL ARTICLE published April 2022 in International Journal of Information Security

Authors: Taha Elamine Hadjadj | Adel Bouhoula | Rim Tebourbi | Riadh Ksantini

Efficient generation of secure elliptic curves

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: Elisavet Konstantinou | Yannis C. Stamatiou | Christos Zaroliagis

Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts

JOURNAL ARTICLE published August 2013 in International Journal of Information Security

Authors: Duong-Hieu Phan | David Pointcheval | Siamak F. Shahandashti | Mario Strefler

An analysis of accuracy experiments carried out over of a multi-faceted model of trust

JOURNAL ARTICLE published April 2009 in International Journal of Information Security

Authors: Karl Quinn | David Lewis | Declan O’Sullivan | Vincent P. Wade

International Journal of Information Security

JOURNAL published

Toward a secure Kerberos key exchange with smart cards

JOURNAL ARTICLE published June 2014 in International Journal of Information Security

Authors: Nikos Mavrogiannopoulos | Andreas Pashalidis | Bart Preneel

Management of access control policies for XML document sources

JOURNAL ARTICLE published July 2003 in International Journal of Information Security

Authors: Barbara Carminati | Elena Ferrari

Developing non-interactive MPC with trusted hardware for enhanced security

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Authors: Ryan Karl | Hannah Burchfield | Jonathan Takeshita | Taeho Jung

Preventing sensitive relationships disclosure for better social media preservation

JOURNAL ARTICLE published April 2016 in International Journal of Information Security

Authors: Elie Raad | Bechara Al Bouna | Richard Chbeir

Generic constructions for role-based encryption

JOURNAL ARTICLE published October 2015 in International Journal of Information Security

Authors: Lan Zhou | Vijay Varadharajan | Michael Hitchens

Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity

JOURNAL ARTICLE published August 2015 in International Journal of Information Security

Authors: Abdeljebar Ameziane El Hassani | Anas Abou El Kalam | Adel Bouhoula | Ryma Abassi | Abdellah Ait Ouahman

Distributing security-mediated PKI

JOURNAL ARTICLE published January 2006 in International Journal of Information Security

Authors: Gabriel Vanrenen | Sean Smith | John Marchesini