Facet browsing currently unavailable
Page 5 of 929 results
Sort by: relevance publication year
Trends in publishing blockchain surveys: a bibliometric perspective JOURNAL ARTICLE published April 2023 in International Journal of Information Security |
Write-only oblivious RAM-based privacy-preserved access of outsourced data JOURNAL ARTICLE published February 2017 in International Journal of Information Security Research funded by Agency for Science, Technology and Research (TSRP 102 158 0038) |
Stack inspection and secure program transformations JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
Dynamic searchable symmetric encryption for storing geospatial data in the cloud JOURNAL ARTICLE published June 2019 in International Journal of Information Security |
You click, I steal: analyzing and detecting click hijacking attacks in web pages JOURNAL ARTICLE published August 2019 in International Journal of Information Security |
Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more JOURNAL ARTICLE published February 2016 in International Journal of Information Security |
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study JOURNAL ARTICLE published April 2023 in International Journal of Information Security |
A survey on analyzing encrypted network traffic of mobile devices JOURNAL ARTICLE published August 2022 in International Journal of Information Security Research funded by Defence Research and Development Organisation (CARS-46) |
A multi-objective cost–benefit optimization algorithm for network hardening JOURNAL ARTICLE published August 2022 in International Journal of Information Security |
Cryptographically sound security proofs for basic and public-key Kerberos JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
Data minimisation in communication protocols: a formal analysis framework and application to identity management JOURNAL ARTICLE published November 2014 in International Journal of Information Security |
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates JOURNAL ARTICLE published April 2023 in International Journal of Information Security |
Mutual authentications to parties with QR-code applications in mobile systems JOURNAL ARTICLE published October 2017 in International Journal of Information Security Research funded by Ministry of Science and Technology, Taiwan (104-2221-E-015-001,101-2218-E-008-003) | National Central University (Software Research Center) |
JOURNAL ARTICLE published November 2002 in International Journal of Information Security |
K maximum probability attack paths generation algorithm for target nodes in networked systems JOURNAL ARTICLE published August 2021 in International Journal of Information Security Research funded by National Natural Science Foundation of China (61672338,51779136,61873160,61373028) |
Privacy-preserving continuous authentication using behavioral biometrics JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Modeling contextual security policies JOURNAL ARTICLE published August 2008 in International Journal of Information Security |
Neighbor discovery protocol anomaly-based detection system using neural network algorithm JOURNAL ARTICLE published 11 February 2024 in International Journal of Information Security |
Applying NLP techniques to malware detection in a practical environment JOURNAL ARTICLE published April 2022 in International Journal of Information Security |