Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 929 results
Sort by: relevance publication year

Privacy-preserving smart metering revisited

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Authors: Alfredo Rial | George Danezis | Markulf Kohlweiss

Temporarily hidden bit commitment and lottery applications

JOURNAL ARTICLE published February 2010 in International Journal of Information Security

Authors: David M. Goldschlag | Stuart G. Stubblebine | Paul F. Syverson

Anomalous behavior detection-based approach for authenticating smart home system users

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: Noureddine Amraoui | Belhassen Zouari

Protecting data privacy through hard-to-reverse negative databases

JOURNAL ARTICLE published 9 October 2007 in International Journal of Information Security

Authors: Fernando Esponda | Elena S. Ackley | Paul Helman | Haixia Jia | Stephanie Forrest

Multi-Keyword search over encrypted data with scoring and search pattern obfuscation

JOURNAL ARTICLE published June 2016 in International Journal of Information Security

Authors: Cengiz Orencik | Ayse Selcuk | Erkay Savas | Murat Kantarcioglu

DOMtegrity: ensuring web page integrity against malicious browser extensions

JOURNAL ARTICLE published December 2019 in International Journal of Information Security

Research funded by European Research Council (ERC Starting Grant (No. 306994))

Authors: Ehsan Toreini | Siamak F. Shahandashti | Maryam Mehrnezhad | Feng Hao

Intelligent and behavioral-based detection of malware in IoT spectrum sensors

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Research funded by Armasuisse (CYD-C-2020003,R-3210/047-31)

Authors: Alberto Huertas Celdrán | Pedro Miguel Sánchez Sánchez | Miguel Azorín Castillo | Gérôme Bovet | Gregorio Martínez Pérez | Burkhard Stiller

Password-authenticated searchable encryption

JOURNAL ARTICLE published October 2021 in International Journal of Information Security

Authors: Liqun Chen | Kaibin Huang | Mark Manulis | Venkkatesh Sekar

Achieving dynamicity in security policies enforcement using aspects

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Authors: Samiha Ayed | Muhammad Sabir Idrees | Nora Cuppens | Frederic Cuppens

Secure pay-TV for chained hotels

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Research funded by National Key Basic Research Program (973 program) (2012CB315905) | National Natural Science Foundation of China (CN) (61370190) | Natural Science Foundation of Jilin Province (CN) (61472029,61472429) | Natural Science Foundation of China (61472083) | Beijing Natural Science Foundation (4132056,4122041) | Research Funds of Renmin University of China (14XNLF02)

Authors: Hua Deng | Yunya Zhou | Qianhong Wu | Bo Qin | Jianwei Liu

Enhancing grid security by fine-grained behavioral control and negotiation-based authorization

JOURNAL ARTICLE published August 2009 in International Journal of Information Security

Authors: Hristo Koshutanski | Aliaksandr Lazouski | Fabio Martinelli | Paolo Mori

A pairing-based cryptographic approach for data security in the cloud

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Authors: Miguel Morales-Sandoval | Jose Luis Gonzalez-Compean | Arturo Diaz-Perez | Victor J. Sosa-Sosa

An intrusion detection approach based on incremental long short-term memory

JOURNAL ARTICLE published April 2023 in International Journal of Information Security

Research funded by National Science Foundation of China (51704138) | National Key Research and Development Program (2019YFB1406002) | Key Scientific Research Project of Liaoning Provincial Department of Education (LZD202002) | Liaoning Education Department (JYT19053) | National Natural Science Foundation of Liaoning (2020-MS-239) | Teaching Reform Project of Liaoning University (JG2020YBXW127)

Authors: Hanxun Zhou | Longyu Kang | Hong Pan | Guo Wei | Yong Feng

Optimal security hardening on attack tree models of networks: a cost-benefit analysis

JOURNAL ARTICLE published June 2012 in International Journal of Information Security

Authors: Rinku Dewri | Indrajit Ray | Nayot Poolsappasit | Darrell Whitley

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: S. Kim | H. Oh

Preface

JOURNAL ARTICLE published April 2006 in International Journal of Information Security

Authors: Jianying Zhou | Javier Lopez

Systematic review of SIEM technology: SIEM-SC birth

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Authors: Juan Miguel López Velásquez | Sergio Mauricio Martínez Monterrubio | Luis Enrique Sánchez Crespo | David Garcia Rosado

Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Gulab Sah | Subhasish Banerjee | Sweety Singh

Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks

JOURNAL ARTICLE published November 2011 in International Journal of Information Security

Authors: Josep M. Miret | Francesc Sebé

Using ambients to control resources

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: David Teller | Pascal Zimmer | Daniel Hirschkoff