Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 929 results
Sort by: relevance publication year

Privacy-preserving smart metering revisited

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Authors: Alfredo Rial | George Danezis | Markulf Kohlweiss

Temporarily hidden bit commitment and lottery applications

JOURNAL ARTICLE published February 2010 in International Journal of Information Security

Authors: David M. Goldschlag | Stuart G. Stubblebine | Paul F. Syverson

Anomalous behavior detection-based approach for authenticating smart home system users

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: Noureddine Amraoui | Belhassen Zouari

Protecting data privacy through hard-to-reverse negative databases

JOURNAL ARTICLE published 9 October 2007 in International Journal of Information Security

Authors: Fernando Esponda | Elena S. Ackley | Paul Helman | Haixia Jia | Stephanie Forrest

Multi-Keyword search over encrypted data with scoring and search pattern obfuscation

JOURNAL ARTICLE published June 2016 in International Journal of Information Security

Authors: Cengiz Orencik | Ayse Selcuk | Erkay Savas | Murat Kantarcioglu

Intelligent and behavioral-based detection of malware in IoT spectrum sensors

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Research funded by Armasuisse (CYD-C-2020003,R-3210/047-31)

Authors: Alberto Huertas Celdrán | Pedro Miguel Sánchez Sánchez | Miguel Azorín Castillo | Gérôme Bovet | Gregorio Martínez Pérez | Burkhard Stiller

Password-authenticated searchable encryption

JOURNAL ARTICLE published October 2021 in International Journal of Information Security

Authors: Liqun Chen | Kaibin Huang | Mark Manulis | Venkkatesh Sekar

Achieving dynamicity in security policies enforcement using aspects

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Authors: Samiha Ayed | Muhammad Sabir Idrees | Nora Cuppens | Frederic Cuppens

Secure pay-TV for chained hotels

JOURNAL ARTICLE published February 2018 in International Journal of Information Security

Research funded by National Key Basic Research Program (973 program) (2012CB315905) | National Natural Science Foundation of China (CN) (61370190) | Natural Science Foundation of Jilin Province (CN) (61472029,61472429) | Natural Science Foundation of China (61472083) | Beijing Natural Science Foundation (4132056,4122041) | Research Funds of Renmin University of China (14XNLF02)

Authors: Hua Deng | Yunya Zhou | Qianhong Wu | Bo Qin | Jianwei Liu

Enhancing grid security by fine-grained behavioral control and negotiation-based authorization

JOURNAL ARTICLE published August 2009 in International Journal of Information Security

Authors: Hristo Koshutanski | Aliaksandr Lazouski | Fabio Martinelli | Paolo Mori

A pairing-based cryptographic approach for data security in the cloud

JOURNAL ARTICLE published August 2018 in International Journal of Information Security

Authors: Miguel Morales-Sandoval | Jose Luis Gonzalez-Compean | Arturo Diaz-Perez | Victor J. Sosa-Sosa

An intrusion detection approach based on incremental long short-term memory

JOURNAL ARTICLE published April 2023 in International Journal of Information Security

Research funded by National Science Foundation of China (51704138) | National Key Research and Development Program (2019YFB1406002) | Key Scientific Research Project of Liaoning Provincial Department of Education (LZD202002) | Liaoning Education Department (JYT19053) | National Natural Science Foundation of Liaoning (2020-MS-239) | Teaching Reform Project of Liaoning University (JG2020YBXW127)

Authors: Hanxun Zhou | Longyu Kang | Hong Pan | Guo Wei | Yong Feng

Optimal security hardening on attack tree models of networks: a cost-benefit analysis

JOURNAL ARTICLE published June 2012 in International Journal of Information Security

Authors: Rinku Dewri | Indrajit Ray | Nayot Poolsappasit | Darrell Whitley

JOURNAL ARTICLE published November 2002 in International Journal of Information Security

Authors: S. Kim | H. Oh

Preface

JOURNAL ARTICLE published April 2006 in International Journal of Information Security

Authors: Jianying Zhou | Javier Lopez

Systematic review of SIEM technology: SIEM-SC birth

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Authors: Juan Miguel López Velásquez | Sergio Mauricio Martínez Monterrubio | Luis Enrique Sánchez Crespo | David Garcia Rosado

Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Gulab Sah | Subhasish Banerjee | Sweety Singh

Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks

JOURNAL ARTICLE published November 2011 in International Journal of Information Security

Authors: Josep M. Miret | Francesc Sebé

Using ambients to control resources

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: David Teller | Pascal Zimmer | Daniel Hirschkoff

ASICS: authenticated key exchange security incorporating certification systems

JOURNAL ARTICLE published April 2017 in International Journal of Information Security

Authors: Colin Boyd | Cas Cremers | Michèle Feltz | Kenneth G. Paterson | Bertram Poettering | Douglas Stebila