Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 928 results
Sort by: relevance publication year

Using ambients to control resources

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: David Teller | Pascal Zimmer | Daniel Hirschkoff

ASICS: authenticated key exchange security incorporating certification systems

JOURNAL ARTICLE published April 2017 in International Journal of Information Security

Authors: Colin Boyd | Cas Cremers | Michèle Feltz | Kenneth G. Paterson | Bertram Poettering | Douglas Stebila

A practical privacy-preserving targeted advertising scheme for IPTV users

JOURNAL ARTICLE published August 2016 in International Journal of Information Security

Research funded by TurkTelekom (3014-02)

Authors: Leyli Javid Khayati | Cengiz Orencik | Erkay Savas | Berkant Ustaoglu

Toward tracing and revoking schemes secure against collusion and any form of secret information leakage

JOURNAL ARTICLE published February 2013 in International Journal of Information Security

Authors: Paolo D’Arco | Angel Perez del Pozo

A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Sara Baradaran | Mahdi Heidari | Ali Kamali | Maryam Mouzarani

Blockchain-based multi-diagnosis deep learning application for various diseases classification

JOURNAL ARTICLE published February 2024 in International Journal of Information Security

Authors: Hakima Rym Rahal | Sihem Slatnia | Okba Kazar | Ezedin Barka | Saad Harous

Highly private blockchain-based management system for digital COVID-19 certificates

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Authors: Rosa Pericàs-Gornals | Macià Mut-Puigserver | M. Magdalena Payeras-Capellà

Conditional reactive simulatability

JOURNAL ARTICLE published April 2008 in International Journal of Information Security

Authors: Michael Backes | Markus Dürmuth | Dennis Hofheinz | Ralf Küsters

Secure universal designated verifier signature without random oracles

JOURNAL ARTICLE published June 2008 in International Journal of Information Security

Authors: Xinyi Huang | Willy Susilo | Yi Mu | Wei Wu

The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

JOURNAL ARTICLE published November 2012 in International Journal of Information Security

Authors: Nasour Bagheri | Praveen Gauravaram | Lars R. Knudsen | Erik Zenner

Zheng and Seberry’s public key encryption scheme revisited

JOURNAL ARTICLE published November 2003 in International Journal of Information Security

Authors: Joonsang Baek | Yuliang Zheng

JOURNAL ARTICLE published February 2002 in International Journal of Information Security

Authors: Michiharu Kudo

Minimizing TTP's involvement in signature validation

JOURNAL ARTICLE published January 2006 in International Journal of Information Security

Authors: Jianying Zhou | Feng Bao | Robert Deng

Cryptographically sound security proofs for basic and public-key Kerberos

JOURNAL ARTICLE published June 2011 in International Journal of Information Security

Authors: Michael Backes | Iliano Cervesato | Aaron D. Jaggard | Andre Scedrov | Joe-Kai Tsay

AutoPKI: public key infrastructure for IoT with automated trust transfer

JOURNAL ARTICLE published 2 March 2024 in International Journal of Information Security

Authors: Joel Höglund | Simon Bouget | Martin Furuhed | John Preuß Mattsson | Göran Selander | Shahid Raza

Passive-attack analysis for connection-based anonymity systems

JOURNAL ARTICLE published June 2005 in International Journal of Information Security

Authors: Andrei Serjantov | Peter Sewell

Resolving privacy-preserving relationships over outsourced encrypted data storages

JOURNAL ARTICLE published April 2016 in International Journal of Information Security

Authors: Alberto Huertas Celdrán | Ginés Dólera Tormo | Félix Gómez Mármol | Manuel Gil Pérez | Gregorio Martínez Pérez

A multi-objective cost–benefit optimization algorithm for network hardening

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Authors: Kengo Zenitani

Stack inspection and secure program transformations

JOURNAL ARTICLE published August 2004 in International Journal of Information Security

Authors: Massimo Bartoletti | Pierpaolo Degano | Gian Luigi Ferrari

TENET: a new hybrid network architecture for adversarial defense

JOURNAL ARTICLE published August 2023 in International Journal of Information Security

Authors: Omer Faruk Tuna | Ferhat Ozgur Catak | M. Taner Eskil