default search action
International Journal of Information Security, Volume 13
Volume 13, Number 1, February 2014
- Qi Liao, Zhen Li:
Portfolio optimization of computer and mobile botnets. 1-14 - Takaaki Mizuki, Hiroki Shizuya:
A formalization of card-based cryptographic protocols via abstract machine. 15-23 - Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. 25-49 - Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Jacob C. N. Schuldt:
Group signature implies public-key encryption with non-interactive opening. 51-62 - Gustavo Gonzalez Granadillo, Malek Belhaouane, Hervé Debar, Grégoire Jacob:
RORI-based countermeasure selection using the OrBAC formalism. 63-79 - Navajit Saikia, Prabin Kumar Bora:
Perceptual hash function for scalable video. 81-93
Volume 13, Number 2, April 2014
- Security in cloud computing. 95-96
- Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu:
Security policy verification for multi-domains in cloud systems. 97-111 - Diogo A. B. Fernandes, Liliana F. B. Soares, João V. P. Gomes, Mário M. Freire, Pedro R. M. Inácio:
Security issues in cloud environments: a survey. 113-170 - Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler:
On detecting co-resident cloud instances using network flow watermarking techniques. 171-189 - Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto:
Enhanced GeoProof: improved geographic assurance for data in the cloud. 191-198 - David Nuñez, Isaac Agudo:
BlindIdM: A privacy-preserving approach for identity management as a service. 199-215
Volume 13, Number 3, June 2014
- Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel:
Toward a secure Kerberos key exchange with smart cards. 217-228 - Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Active authentication for mobile devices utilising behaviour profiling. 229-244 - Tzong-Sun Wu, Ming-Lun Lee, Han-Yu Lin, Chao-Yuan Wang:
Shoulder-surfing-proof graphical password authentication scheme. 245-254 - Chengpo Mu, Meng Yu, Yingjiu Li, Wanyu Zang:
Risk balance defense approach against intrusions for network server. 255-269 - Bin Lian, Gongliang Chen, Jianhua Li:
Provably secure E-cash system with practical and efficient complete tracing. 271-289 - Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane:
All-or-Nothing Transforms as a countermeasure to differential side-channel analysis. 291-304
Volume 13, Number 4, August 2014
- Kee Sung Kim, Ik Rae Jeong:
Efficient verifiably encrypted signatures from lattices. 305-314 - Reza Sepahi, Ron Steinfeld, Josef Pieprzyk:
Lattice-based certificateless public-key encryption in the standard model. 315-333 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Sufficient conditions for sound tree and sequential hashing modes. 335-353 - Amerah Alabrah, Jeffrey Cashion, Mostafa A. Bassiouni:
Enhancing security of cookie-based sessions in mobile networks using sparse caching. 355-366 - Alireza Shameli-Sendi, Michel R. Dagenais:
ARITO: Cyber-attack response system using accurate risk impact tolerance. 367-390 - Mousa Mousazadeh, Behrouz Tork Ladani:
Randomized gossip algorithms under attack. 391-402
Volume 13, Number 5, October 2014
- Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult:
Wirelessly lockpicking a smart card reader. 403-420 - Luigi Catuogno, Clemente Galdi:
Analysis of a two-factor graphical password scheme. 421-437 - Meng Zhang, Anand Raghunathan, Niraj K. Jha:
A defense framework against malware and vulnerability exploits. 439-452 - Rehana Yasmin, Eike Ritter, Guilin Wang:
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks. 453-465 - Weizheng Gao, Kashi Neupane, Rainer Steinwandt:
Tuning a two-round group key agreement. 467-476 - Sooyeon Shin, Taekyoung Kwon:
AAnA: Anonymous authentication and authorization based on short traceable signatures. 477-495
Volume 13, Number 6, November 2014
- Javier Herranz, Jordi Nin:
Secure and efficient anonymization of distributed confidential databases. 497-512 - Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:
Anonymity guarantees of the UMTS/LTE authentication and connection protocol. 513-527 - Meilof Veeningen, Benne de Weger, Nicola Zannone:
Data minimisation in communication protocols: a formal analysis framework and application to identity management. 529-569 - Vladimir Jovanovikj, Dusan Gabrijelcic, Tomaz Klobucar:
A conceptual model of security context. 571-581 - Sevil Sen:
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection. 583-590
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.