default search action
International Journal of Information Security, Volume 8
Volume 8, Number 1, February 2009
- Jiqiang Lu:
Related-key rectangle attack on 36 rounds of the XTEA block cipher. 1-11 - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:
Bipartite modular multiplication with twice the bit-length of multipliers. 13-23 - Daxin Tian, Yanheng Liu, Yang Xiang:
Large-scale network intrusion detection based on distributed learning algorithm. 25-35 - Jiin-Chiou Cheng, Chi-Sung Laih:
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. 37-48 - Atefeh Mashatan, Douglas R. Stinson:
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. 49-60 - Maithili Narasimha, John Solis, Gene Tsudik:
Privacy-preserving revocation checking. 61-75
Volume 8, Number 2, April 2009
- Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan, John A. MacDonald:
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. 77-87 - Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu:
Denial of service attacks and defenses in decentralized trust management. 89-101 - Karl Quinn, David Lewis, Declan O'Sullivan, Vincent P. Wade:
An analysis of accuracy experiments carried out over of a multi-faceted model of trust. 103-119 - Eugene Y. Vasserman, Nicholas Hopper, James Tyra:
Silent Knock : practical, provably undetectable authentication. 121-135 - David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen:
Adding support to XACML for multi-domain user to user dynamic delegation of authority. 137-152
Volume 8, Number 3, June 2009
- Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh:
Intrusion detection in voice over IP environments. 153-172 - Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko:
Generalized XML security views. 173-203 - Lein Harn, Jian Ren, Changlu Lin:
Efficient identity-based GQ multisignatures. 205-210 - Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic block ciphers: method, security and instantiations. 211-231
Volume 8, Number 4, August 2009
- Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Ensuring security in depth based on heterogeneous network security technologies. 233-246 - Abdelrahman Desoky:
Listega: list-based steganography methodology. 247-261 - Sangho Lee, Jong Kim, Sung Je Hong:
Redistributing time-based rights between consumer devices for content sharing in DRM system. 263-273 - Richard Shay, Elisa Bertino:
A comprehensive simulation tool for the analysis of password policies. 275-289 - Hristo Koshutanski, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori:
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. 291-314
Volume 8, Number 5, October 2009
- Ernie Brickell, Liqun Chen, Jiangtao Li:
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. 315-330 - Fernando Esponda, Stephanie Forrest, Paul Helman:
Negative representations of information. 331-345 - Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro:
On the pseudo-freeness and the CDH assumption. 347-355 - Erel Geron, Avishai Wool:
CRUST: cryptographic remote untrusted storage without public keys. 357-377 - Huawang Qin, Yuewei Dai, Zhiquan Wang:
A secret sharing scheme based on (t, n) threshold and adversary structure. 379-385
Volume 8, Number 6, December 2009
- Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot:
User interface design affects security: patterns in click-based graphical passwords. 387-398 - Christian Hammer, Gregor Snelting:
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. 399-422 - Xiangdong An, Dawn N. Jutla, Nick Cercone, Charnyote Pluempitiwiriyawej, Hai Wang:
Uncertain inference control in privacy protection. 423-431 - Hedieh Sajedi, Mansour Jamzad:
Secure steganography based on embedding capacity. 433-445 - Rainer Plaga:
Biometric keys: suitable use cases and achievable information content. 447-454 - Mario Kozina, Marin Golub, Stjepan Gros:
A method for identifying Web applications. 455-467
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.