Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 929 results
Sort by: relevance publication year

Secure and efficient anonymization of distributed confidential databases

JOURNAL ARTICLE published November 2014 in International Journal of Information Security

Authors: Javier Herranz | Jordi Nin

Protocols useful on the Internet from distributed signature schemes

JOURNAL ARTICLE published November 2004 in International Journal of Information Security

Authors: Vanesa Daza | Javier Herranz | Germán Sáez

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: Ed Dawson | Kapali Viswanathan | Colin Boyd

Generic construction of an $$mathrm {eCK}$$ eCK -secure key exchange protocol in the standard model

JOURNAL ARTICLE published October 2017 in International Journal of Information Security

Authors: Janaka Alawatugoda

Preface

JOURNAL ARTICLE published January 2008 in International Journal of Information Security

Authors: Pierpaolo Degano | Luca Viganò

Preface

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

KAMU: providing advanced user privacy in Kerberos multi-domain scenarios

JOURNAL ARTICLE published November 2013 in International Journal of Information Security

Authors: F. Pereñíguez-García | R. Marín-López | G. Kambourakis | A. Ruiz-Martínez | S. Gritzalis | A. F. Skarmeta-Gómez

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: J.M. Gonzáles Nieto | K. Viswanathan | C. Boyd | A. Clark | E. Dawson

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: E. Damiani | S. De Capitani di Vimercati | S. Paraboschi | P. Samarati

RAMA: a risk assessment solution for healthcare organizations

JOURNAL ARTICLE published 1 March 2024 in International Journal of Information Security

Research funded by Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275)

Authors: Michail Smyrlis | Evangelos Floros | Ioannis Basdekis | Dumitru-Bogdan Prelipcean | Aristeidis Sotiropoulos | Herve Debar | Apostolis Zarras | George Spanoudakis

On detecting co-resident cloud instances using network flow watermarking techniques

JOURNAL ARTICLE published April 2014 in International Journal of Information Security

Authors: Adam Bates | Benjamin Mood | Joe Pletcher | Hannah Pruse | Masoud Valafar | Kevin Butler

Theory and benefits of recursive certificate structures

JOURNAL ARTICLE published January 2004 in International Journal of Information Security

Authors: Selwyn Russell

On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem

JOURNAL ARTICLE published April 2013 in International Journal of Information Security

Authors: Panagiotis Rizomiliotis | Stefanos Gritzalis

A content-based deep intrusion detection system

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: Mahdi Soltani | Mahdi Jafari Siavoshani | Amir Hossein Jahangir

Efficient microaggregation techniques for large numerical data volumes

JOURNAL ARTICLE published August 2012 in International Journal of Information Security

Authors: Marc Solé | Victor Muntés-Mulero | Jordi Nin

Authenticating mobile phone users using keystroke analysis

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: N. L. Clarke | S. M. Furnell

C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks

JOURNAL ARTICLE published 29 April 2024 in International Journal of Information Security

Authors: Raja Zeeshan Haider | Baber Aslam | Haider Abbas | Zafar Iqbal

Perceptual hash function for scalable video

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Navajit Saikia | Prabin K. Bora

Integrating identity-based and certificate-based authenticated key exchange protocols

JOURNAL ARTICLE published August 2011 in International Journal of Information Security

Authors: Berkant Ustaoğlu

Distributed star coloring of network for IP traceback

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Sangita Roy | Ashok Singh Sairam