Facet browsing currently unavailable
Page 3 of 929 results
Sort by: relevance publication year
Privacy-preserving smart metering revisited JOURNAL ARTICLE published February 2018 in International Journal of Information Security |
Temporarily hidden bit commitment and lottery applications JOURNAL ARTICLE published February 2010 in International Journal of Information Security |
Anomalous behavior detection-based approach for authenticating smart home system users JOURNAL ARTICLE published June 2022 in International Journal of Information Security |
Protecting data privacy through hard-to-reverse negative databases JOURNAL ARTICLE published 9 October 2007 in International Journal of Information Security |
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation JOURNAL ARTICLE published June 2016 in International Journal of Information Security |
DOMtegrity: ensuring web page integrity against malicious browser extensions JOURNAL ARTICLE published December 2019 in International Journal of Information Security Research funded by European Research Council (ERC Starting Grant (No. 306994)) |
Intelligent and behavioral-based detection of malware in IoT spectrum sensors JOURNAL ARTICLE published June 2023 in International Journal of Information Security Research funded by Armasuisse (CYD-C-2020003,R-3210/047-31) |
Password-authenticated searchable encryption JOURNAL ARTICLE published October 2021 in International Journal of Information Security |
Achieving dynamicity in security policies enforcement using aspects JOURNAL ARTICLE published February 2018 in International Journal of Information Security |
Secure pay-TV for chained hotels JOURNAL ARTICLE published February 2018 in International Journal of Information Security Research funded by National Key Basic Research Program (973 program) (2012CB315905) | National Natural Science Foundation of China (CN) (61370190) | Natural Science Foundation of Jilin Province (CN) (61472029,61472429) | Natural Science Foundation of China (61472083) | Beijing Natural Science Foundation (4132056,4122041) | Research Funds of Renmin University of China (14XNLF02) |
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization JOURNAL ARTICLE published August 2009 in International Journal of Information Security |
A pairing-based cryptographic approach for data security in the cloud JOURNAL ARTICLE published August 2018 in International Journal of Information Security |
An intrusion detection approach based on incremental long short-term memory JOURNAL ARTICLE published April 2023 in International Journal of Information Security Research funded by National Science Foundation of China (51704138) | National Key Research and Development Program (2019YFB1406002) | Key Scientific Research Project of Liaoning Provincial Department of Education (LZD202002) | Liaoning Education Department (JYT19053) | National Natural Science Foundation of Liaoning (2020-MS-239) | Teaching Reform Project of Liaoning University (JG2020YBXW127) |
Optimal security hardening on attack tree models of networks: a cost-benefit analysis JOURNAL ARTICLE published June 2012 in International Journal of Information Security |
JOURNAL ARTICLE published November 2002 in International Journal of Information Security |
Preface JOURNAL ARTICLE published April 2006 in International Journal of Information Security |
Systematic review of SIEM technology: SIEM-SC birth JOURNAL ARTICLE published June 2023 in International Journal of Information Security |
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Using ambients to control resources JOURNAL ARTICLE published August 2004 in International Journal of Information Security |