Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 920 results
Sort by: relevance publication year

Secure and efficient anonymization of distributed confidential databases

JOURNAL ARTICLE published November 2014 in International Journal of Information Security

Authors: Javier Herranz | Jordi Nin

Protocols useful on the Internet from distributed signature schemes

JOURNAL ARTICLE published November 2004 in International Journal of Information Security

Authors: Vanesa Daza | Javier Herranz | Germán Sáez

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: Ed Dawson | Kapali Viswanathan | Colin Boyd

Generic construction of an $$mathrm {eCK}$$ eCK -secure key exchange protocol in the standard model

JOURNAL ARTICLE published October 2017 in International Journal of Information Security

Authors: Janaka Alawatugoda

Preface

JOURNAL ARTICLE published January 2008 in International Journal of Information Security

Authors: Pierpaolo Degano | Luca Viganò

Preface

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

KAMU: providing advanced user privacy in Kerberos multi-domain scenarios

JOURNAL ARTICLE published November 2013 in International Journal of Information Security

Authors: F. Pereñíguez-García | R. Marín-López | G. Kambourakis | A. Ruiz-Martínez | S. Gritzalis | A. F. Skarmeta-Gómez

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: J.M. Gonzáles Nieto | K. Viswanathan | C. Boyd | A. Clark | E. Dawson

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: E. Damiani | S. De Capitani di Vimercati | S. Paraboschi | P. Samarati

RAMA: a risk assessment solution for healthcare organizations

JOURNAL ARTICLE published 1 March 2024 in International Journal of Information Security

Research funded by Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275)

Authors: Michail Smyrlis | Evangelos Floros | Ioannis Basdekis | Dumitru-Bogdan Prelipcean | Aristeidis Sotiropoulos | Herve Debar | Apostolis Zarras | George Spanoudakis

Trends in publishing blockchain surveys: a bibliometric perspective

JOURNAL ARTICLE published April 2023 in International Journal of Information Security

Authors: Hira Ahmad | Muhammad Ahtazaz Ahsan | Adnan Noor Mian

Theory and benefits of recursive certificate structures

JOURNAL ARTICLE published January 2004 in International Journal of Information Security

Authors: Selwyn Russell

On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem

JOURNAL ARTICLE published April 2013 in International Journal of Information Security

Authors: Panagiotis Rizomiliotis | Stefanos Gritzalis

Perceptual hash function for scalable video

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Navajit Saikia | Prabin K. Bora

Integrating identity-based and certificate-based authenticated key exchange protocols

JOURNAL ARTICLE published August 2011 in International Journal of Information Security

Authors: Berkant Ustaoğlu

Distributed star coloring of network for IP traceback

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Sangita Roy | Ashok Singh Sairam

Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more

JOURNAL ARTICLE published February 2016 in International Journal of Information Security

Authors: Yu Chen | Qiong Huang | Zongyang Zhang

Preface to the special issue on PKI

JOURNAL ARTICLE published January 2004 in International Journal of Information Security

Authors: E. Dawson

Editorial

JOURNAL ARTICLE published April 2008 in International Journal of Information Security

Authors: Dieter Gollmann

Security analysis of CRT-based cryptosystems

JOURNAL ARTICLE published July 2006 in International Journal of Information Security

Authors: Katsuyuki Okeya | Tsuyoshi Takagi