Facet browsing currently unavailable
Page 1 of 929 results
Sort by: relevance publication year
Generic construction of an $$mathrm {eCK}$$ eCK -secure key exchange protocol in the standard model JOURNAL ARTICLE published October 2017 in International Journal of Information Security |
Activity-based payments: alternative (anonymous) online payment model JOURNAL ARTICLE published 3 February 2024 in International Journal of Information Security |
Preface JOURNAL ARTICLE published January 2008 in International Journal of Information Security |
Preface JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
KAMU: providing advanced user privacy in Kerberos multi-domain scenarios JOURNAL ARTICLE published November 2013 in International Journal of Information Security |
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage JOURNAL ARTICLE published August 2015 in International Journal of Information Security |
Selfish mining attack in blockchain: a systematic literature review JOURNAL ARTICLE published 10 April 2024 in International Journal of Information Security |
A certificateless approach to onion routing JOURNAL ARTICLE published June 2017 in International Journal of Information Security |
Secure and efficient anonymization of distributed confidential databases JOURNAL ARTICLE published November 2014 in International Journal of Information Security |
Protocols useful on the Internet from distributed signature schemes JOURNAL ARTICLE published November 2004 in International Journal of Information Security |
JOURNAL ARTICLE published November 2002 in International Journal of Information Security |
Selecting parameters for secure McEliece-based cryptosystems JOURNAL ARTICLE published June 2012 in International Journal of Information Security |
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators JOURNAL ARTICLE published August 2018 in International Journal of Information Security Research funded by National Basic Research Program of China (973 Program) (NO. 2012CB315901) |
TENET: a new hybrid network architecture for adversarial defense JOURNAL ARTICLE published August 2023 in International Journal of Information Security |
Theory and benefits of recursive certificate structures JOURNAL ARTICLE published January 2004 in International Journal of Information Security |
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem JOURNAL ARTICLE published April 2013 in International Journal of Information Security |
Perceptual hash function for scalable video JOURNAL ARTICLE published February 2014 in International Journal of Information Security |
A method for identifying Web applications JOURNAL ARTICLE published December 2009 in International Journal of Information Security |
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks JOURNAL ARTICLE published June 2023 in International Journal of Information Security |
Integrating identity-based and certificate-based authenticated key exchange protocols JOURNAL ARTICLE published August 2011 in International Journal of Information Security |