Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 928 results
Sort by: relevance publication year

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: Ohad Rodeh | Kenneth P. Birman | Danny Dolev

Message from the Guest Editors

JOURNAL ARTICLE published October 2012 in International Journal of Information Security

Authors: Jianying Zhou | Xuejia Lai | Hui Li

Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing

JOURNAL ARTICLE published April 2020 in International Journal of Information Security

Research funded by Science and Engineering Research Board (ECR/2017/001221)

Authors: Rajendra Patil | Harsha Dudeja | Chirag Modi

Defeating SQL injection attack in authentication security: an experimental study

JOURNAL ARTICLE published February 2019 in International Journal of Information Security

Authors: Debasish Das | Utpal Sharma | D. K. Bhattacharyya

An extended access control mechanism exploiting data dependencies

JOURNAL ARTICLE published February 2017 in International Journal of Information Security

Authors: Davide Alberto Albertini | Barbara Carminati | Elena Ferrari

Aggregate message authentication codes (AMACs) with on-the-fly verification

JOURNAL ARTICLE published November 2013 in International Journal of Information Security

Authors: Yu-Shian Chen | Chin-Laung Lei

An intrusion detection and prevention system for IMS and VoIP services

JOURNAL ARTICLE published June 2013 in International Journal of Information Security

Authors: Nikos Vrakas | Costas Lambrinoudakis

Minimizing information disclosure to third parties in social login platforms

JOURNAL ARTICLE published October 2012 in International Journal of Information Security

Authors: Georgios Kontaxis | Michalis Polychronakis | Evangelos P. Markatos

Studying lattice reduction algorithms improved by quick reordering technique

JOURNAL ARTICLE published April 2021 in International Journal of Information Security

Research funded by Japan Society for the Promotion of Science (JP17J01987) | Core Research for Evolutional Science and Technology (JPMJCR14D6)

Authors: Yuntao Wang | Tsuyoshi Takagi

Fujisaki–Okamoto hybrid encryption revisited

JOURNAL ARTICLE published October 2005 in International Journal of Information Security

Authors: David Galindo | Sebastià Martín | Paz Morillo | Jorge L. Villar

Secure and collusion-resistant data aggregation from convertible tags

JOURNAL ARTICLE published February 2021 in International Journal of Information Security

Authors: Iraklis Leontiadis | Ming Li

Probabilistic timing covert channels: to close or not to close?

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

Authors: Alessandra Di Pierro | Chris Hankin | Herbert Wiklicky

Access right management by extended password capabilities

JOURNAL ARTICLE published October 2018 in International Journal of Information Security

Research funded by Italian Ministry of Education, University and Research (20103P34XC_008)

Authors: Lanfranco Lopriore

A new hardware-assisted PIR with O(n) shuffle cost

JOURNAL ARTICLE published August 2010 in International Journal of Information Security

Authors: Xuhua Ding | Yanjiang Yang | Robert H. Deng | Shuhong Wang

Reactively secure signature schemes

JOURNAL ARTICLE published October 2005 in International Journal of Information Security

Authors: Michael Backes | Birgit Pfitzmann | Michael Waidner

A new probabilistic rekeying method for secure multicast groups

JOURNAL ARTICLE published August 2010 in International Journal of Information Security

Authors: Alwyn R. Pais | Shankar Joshi

Track for surveys

JOURNAL ARTICLE published February 2022 in International Journal of Information Security

After you, please: browser extensions order attacks and countermeasures

JOURNAL ARTICLE published December 2020 in International Journal of Information Security

Research funded by Vetenskapsrådet (2015-04154) | Ministerio de Economía, Industria y Competitividad, Gobierno de España (TIN2016-79095-C2-2-R) | Comunidad de Madrid (S2013/ICE-3095)

Authors: Pablo Picazo-Sanchez | Juan Tapiador | Gerardo Schneider

Malware analysis using visualized images and entropy graphs

JOURNAL ARTICLE published February 2015 in International Journal of Information Security

Authors: Kyoung Soo Han | Jae Hyun Lim | Boojoong Kang | Eul Gyu Im

Shoulder-surfing-proof graphical password authentication scheme

JOURNAL ARTICLE published June 2014 in International Journal of Information Security

Authors: Tzong-Sun Wu | Ming-Lun Lee | Han-Yu Lin | Chao-Yuan Wang