Facet browsing currently unavailable
Page 1 of 928 results
Sort by: relevance publication year
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
Message from the Guest Editors JOURNAL ARTICLE published October 2012 in International Journal of Information Security |
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing JOURNAL ARTICLE published April 2020 in International Journal of Information Security Research funded by Science and Engineering Research Board (ECR/2017/001221) |
Defeating SQL injection attack in authentication security: an experimental study JOURNAL ARTICLE published February 2019 in International Journal of Information Security |
An extended access control mechanism exploiting data dependencies JOURNAL ARTICLE published February 2017 in International Journal of Information Security |
Aggregate message authentication codes (AMACs) with on-the-fly verification JOURNAL ARTICLE published November 2013 in International Journal of Information Security |
An intrusion detection and prevention system for IMS and VoIP services JOURNAL ARTICLE published June 2013 in International Journal of Information Security |
Minimizing information disclosure to third parties in social login platforms JOURNAL ARTICLE published October 2012 in International Journal of Information Security |
Studying lattice reduction algorithms improved by quick reordering technique JOURNAL ARTICLE published April 2021 in International Journal of Information Security Research funded by Japan Society for the Promotion of Science (JP17J01987) | Core Research for Evolutional Science and Technology (JPMJCR14D6) |
Fujisaki–Okamoto hybrid encryption revisited JOURNAL ARTICLE published October 2005 in International Journal of Information Security |
Secure and collusion-resistant data aggregation from convertible tags JOURNAL ARTICLE published February 2021 in International Journal of Information Security |
Probabilistic timing covert channels: to close or not to close? JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
Access right management by extended password capabilities JOURNAL ARTICLE published October 2018 in International Journal of Information Security Research funded by Italian Ministry of Education, University and Research (20103P34XC_008) |
A new hardware-assisted PIR with O(n) shuffle cost JOURNAL ARTICLE published August 2010 in International Journal of Information Security |
Reactively secure signature schemes JOURNAL ARTICLE published October 2005 in International Journal of Information Security |
A new probabilistic rekeying method for secure multicast groups JOURNAL ARTICLE published August 2010 in International Journal of Information Security |
Track for surveys JOURNAL ARTICLE published February 2022 in International Journal of Information Security |
After you, please: browser extensions order attacks and countermeasures JOURNAL ARTICLE published December 2020 in International Journal of Information Security Research funded by Vetenskapsrådet (2015-04154) | Ministerio de Economía, Industria y Competitividad, Gobierno de España (TIN2016-79095-C2-2-R) | Comunidad de Madrid (S2013/ICE-3095) |
Malware analysis using visualized images and entropy graphs JOURNAL ARTICLE published February 2015 in International Journal of Information Security |
Shoulder-surfing-proof graphical password authentication scheme JOURNAL ARTICLE published June 2014 in International Journal of Information Security |