Facet browsing currently unavailable
Page 4 of 928 results
Sort by: relevance publication year
Using ambients to control resources JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
ASICS: authenticated key exchange security incorporating certification systems JOURNAL ARTICLE published April 2017 in International Journal of Information Security |
A practical privacy-preserving targeted advertising scheme for IPTV users JOURNAL ARTICLE published August 2016 in International Journal of Information Security Research funded by TurkTelekom (3014-02) |
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage JOURNAL ARTICLE published February 2013 in International Journal of Information Security |
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Blockchain-based multi-diagnosis deep learning application for various diseases classification JOURNAL ARTICLE published February 2024 in International Journal of Information Security |
Highly private blockchain-based management system for digital COVID-19 certificates JOURNAL ARTICLE published October 2022 in International Journal of Information Security |
Conditional reactive simulatability JOURNAL ARTICLE published April 2008 in International Journal of Information Security |
Secure universal designated verifier signature without random oracles JOURNAL ARTICLE published June 2008 in International Journal of Information Security |
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis JOURNAL ARTICLE published November 2012 in International Journal of Information Security |
Zheng and Seberry’s public key encryption scheme revisited JOURNAL ARTICLE published November 2003 in International Journal of Information Security |
JOURNAL ARTICLE published February 2002 in International Journal of Information Security |
Minimizing TTP's involvement in signature validation JOURNAL ARTICLE published January 2006 in International Journal of Information Security |
Cryptographically sound security proofs for basic and public-key Kerberos JOURNAL ARTICLE published June 2011 in International Journal of Information Security |
AutoPKI: public key infrastructure for IoT with automated trust transfer JOURNAL ARTICLE published 2 March 2024 in International Journal of Information Security |
Passive-attack analysis for connection-based anonymity systems JOURNAL ARTICLE published June 2005 in International Journal of Information Security |
Resolving privacy-preserving relationships over outsourced encrypted data storages JOURNAL ARTICLE published April 2016 in International Journal of Information Security |
A multi-objective cost–benefit optimization algorithm for network hardening JOURNAL ARTICLE published August 2022 in International Journal of Information Security |
Stack inspection and secure program transformations JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
TENET: a new hybrid network architecture for adversarial defense JOURNAL ARTICLE published August 2023 in International Journal of Information Security |