Facet browsing currently unavailable
Page 4 of 929 results
Sort by: relevance publication year
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Passive-attack analysis for connection-based anonymity systems JOURNAL ARTICLE published June 2005 in International Journal of Information Security |
Challenges of post-quantum digital signing in real-world applications: a survey JOURNAL ARTICLE published August 2022 in International Journal of Information Security Research funded by Ministry of Education (MOE2018-T2-1-111) |
Random dictatorship for privacy-preserving social choice JOURNAL ARTICLE published October 2020 in International Journal of Information Security Research funded by Vetenskapsrådet (VR 2016-03346) |
Efficient identity-based online/offline encryption and signcryption with short ciphertext JOURNAL ARTICLE published June 2017 in International Journal of Information Security |
A novel two-level secure access control approach for blockchain platform in healthcare JOURNAL ARTICLE published August 2023 in International Journal of Information Security |
A review on fake news detection 3T’s: typology, time of detection, taxonomies JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
A practical privacy-preserving targeted advertising scheme for IPTV users JOURNAL ARTICLE published August 2016 in International Journal of Information Security Research funded by TurkTelekom (3014-02) |
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage JOURNAL ARTICLE published February 2013 in International Journal of Information Security |
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management JOURNAL ARTICLE published June 2018 in International Journal of Information Security |
Authenticating mobile phone users using keystroke analysis JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |
A content-based deep intrusion detection system JOURNAL ARTICLE published June 2022 in International Journal of Information Security |
Generalizing cryptosystems based on the subset sum problem JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
Enhanced GeoProof: improved geographic assurance for data in the cloud JOURNAL ARTICLE published April 2014 in International Journal of Information Security |
Zheng and Seberry’s public key encryption scheme revisited JOURNAL ARTICLE published November 2003 in International Journal of Information Security |
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
Minimizing TTP's involvement in signature validation JOURNAL ARTICLE published January 2006 in International Journal of Information Security |
Alambic: a privacy-preserving recommender system for electronic commerce JOURNAL ARTICLE published October 2008 in International Journal of Information Security |
Privacy preserving data sharing and analysis for edge-based architectures JOURNAL ARTICLE published February 2022 in International Journal of Information Security Research funded by Horizon 2020 Framework Programme (952652) | H2020 Excellent Science (700294) |
On detecting co-resident cloud instances using network flow watermarking techniques JOURNAL ARTICLE published April 2014 in International Journal of Information Security |