Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 929 results
Sort by: relevance publication year

Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks

JOURNAL ARTICLE published November 2011 in International Journal of Information Security

Authors: Josep M. Miret | Francesc Sebé

Passive-attack analysis for connection-based anonymity systems

JOURNAL ARTICLE published June 2005 in International Journal of Information Security

Authors: Andrei Serjantov | Peter Sewell

Challenges of post-quantum digital signing in real-world applications: a survey

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Research funded by Ministry of Education (MOE2018-T2-1-111)

Authors: Teik Guan Tan | Pawel Szalachowski | Jianying Zhou

Random dictatorship for privacy-preserving social choice

JOURNAL ARTICLE published October 2020 in International Journal of Information Security

Research funded by Vetenskapsrådet (VR 2016-03346)

Authors: Vicenç Torra

Efficient identity-based online/offline encryption and signcryption with short ciphertext

JOURNAL ARTICLE published June 2017 in International Journal of Information Security

Authors: Jianchang Lai | Yi Mu | Fuchun Guo

A novel two-level secure access control approach for blockchain platform in healthcare

JOURNAL ARTICLE published August 2023 in International Journal of Information Security

Authors: Shweta Mittal | Mohona Ghosh

A review on fake news detection 3T’s: typology, time of detection, taxonomies

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Shubhangi Rastogi | Divya Bansal

A practical privacy-preserving targeted advertising scheme for IPTV users

JOURNAL ARTICLE published August 2016 in International Journal of Information Security

Research funded by TurkTelekom (3014-02)

Authors: Leyli Javid Khayati | Cengiz Orencik | Erkay Savas | Berkant Ustaoglu

Toward tracing and revoking schemes secure against collusion and any form of secret information leakage

JOURNAL ARTICLE published February 2013 in International Journal of Information Security

Authors: Paolo D’Arco | Angel Perez del Pozo

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Yujue Wang | HweeHwa Pang | Robert H. Deng

Authenticating mobile phone users using keystroke analysis

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: N. L. Clarke | S. M. Furnell

A content-based deep intrusion detection system

JOURNAL ARTICLE published June 2022 in International Journal of Information Security

Authors: Mahdi Soltani | Mahdi Jafari Siavoshani | Amir Hossein Jahangir

Generalizing cryptosystems based on the subset sum problem

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

Authors: Aniket Kate | Ian Goldberg

Enhanced GeoProof: improved geographic assurance for data in the cloud

JOURNAL ARTICLE published April 2014 in International Journal of Information Security

Authors: Aiiad Albeshri | Colin Boyd | Juan González Nieto

Zheng and Seberry’s public key encryption scheme revisited

JOURNAL ARTICLE published November 2003 in International Journal of Information Security

Authors: Joonsang Baek | Yuliang Zheng

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: Michiharu Kudo

Minimizing TTP's involvement in signature validation

JOURNAL ARTICLE published January 2006 in International Journal of Information Security

Authors: Jianying Zhou | Feng Bao | Robert Deng

Alambic: a privacy-preserving recommender system for electronic commerce

JOURNAL ARTICLE published October 2008 in International Journal of Information Security

Authors: Esma Aïmeur | Gilles Brassard | José M. Fernandez | Flavien Serge Mani Onana

Privacy preserving data sharing and analysis for edge-based architectures

JOURNAL ARTICLE published February 2022 in International Journal of Information Security

Research funded by Horizon 2020 Framework Programme (952652) | H2020 Excellent Science (700294)

Authors: Mina Sheikhalishahi | Andrea Saracino | Fabio Martinelli | Antonio La Marra

On detecting co-resident cloud instances using network flow watermarking techniques

JOURNAL ARTICLE published April 2014 in International Journal of Information Security

Authors: Adam Bates | Benjamin Mood | Joe Pletcher | Hannah Pruse | Masoud Valafar | Kevin Butler