default search action
International Journal of Information Security, Volume 16
Volume 16, Number 1, February 2017
- Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. 1-22 - Lichun Li, Anwitaman Datta:
Write-only oblivious RAM-based privacy-preserved access of outsourced data. 23-42 - Vahid R. Karimi, Paulo S. C. Alencar, Donald D. Cowan:
A formal modeling and analysis approach for access control rules, policies, and their combinations. 43-74 - Davide Alberto Albertini, Barbara Carminati, Elena Ferrari:
An extended access control mechanism exploiting data dependencies. 75-89 - Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets. 91-113
Volume 16, Number 2, April 2017
- Matija Stevanovic, Jens Myrup Pedersen, Alessandro D'Alconzo, Stefan Ruehrup:
A method for identifying compromised clients based on DNS traffic analysis. 115-132 - Maryam Mehrnezhad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini:
PiSHi: click the images and I tell if you are a human. 133-149 - Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. 151-171 - Marco Tiloca, Christian Gehrmann, Ludwig Seitz:
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake. 173-193 - Ankit Singh, Hervais Simo Fhom:
Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection. 195-211 - Christopher Mann, Daniel Loebenberger:
Two-factor authentication for the Bitcoin protocol. 213-226
Volume 16, Number 3, June 2017
- Munkhbayar Bat-Erdene, Hyundo Park, Hongzhe Li, Heejo Lee, Mahn-Soo Choi:
Entropy analysis to classify unknown packing algorithms for malware detection. 227-248 - Riccardo Bernardini, Roberto Rinaldo:
Making random permutations from physically unclonable constants. 249-261 - Minchul Kim, Younghoon Jung, Junghwan Song:
A modified exhaustive search on a password system using SHA-1. 263-269 - Hani Ragab Hassen, Esma Lounes:
A key management scheme evaluation using Markov processes. 271-280 - Felix Günther, Bertram Poettering:
Linkable message tagging: solving the key distribution problem of signature schemes. 281-297 - Jianchang Lai, Yi Mu, Fuchun Guo:
Efficient identity-based online/offline encryption and signcryption with short ciphertext. 299-311 - Panayiotis Kotzanikolaou, George Chatzisofroniou, Mike Burmester:
Broadcast anonymous routing (BAR): scalable real-time anonymous communication. 313-326 - Dario Catalano, Dario Fiore, Rosario Gennaro:
A certificateless approach to onion routing. 327-343
Volume 16, Number 4, August 2017
- Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino:
Stateful Data Usage Control for Android Mobile Devices. 345-369 - A. Ruiz-Heras, Pedro García-Teodoro, Leovigildo Sánchez-Casado:
ADroid: anomaly-based detection of malicious events in Android platforms. 371-384 - Shree Garg, Sateesh Kumar Peddoju, Anil Kumar Sarje:
Network-based detection of Android malicious apps. 385-400 - Constantinos Kolias, Vassilis Kolias, Georgios Kambourakis:
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection. 401-416 - Raghav V. Sampangi, Srinivas Sampalli:
HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms. 417-433 - Nuno Antunes, Marco Vieira:
Designing vulnerability testing tools for web services: approach, components, and tools. 435-457
Volume 16, Number 5, October 2017
- Khamphao Sisaat, Surin Kittitornkun, Hiroaki Kikuchi, Chaxiong Yukonhiatou, Masato Terada, Hiroshi Ishii:
A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study. 459-473 - Patrick Düssel, Christian Gehl, Ulrich Flegel, Sven Dietrich, Michael Meier:
Detecting zero-day attacks using context-aware anomaly detection at the application-layer. 475-490 - Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Dermot Ryan:
Analysis of privacy in mobile telephony systems. 491-523 - Cheng-Ta Huang, Yu Hong Zhang, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
Mutual authentications to parties with QR-code applications in mobile systems. 525-540 - Janaka Alawatugoda:
Generic construction of an eCK -secure key exchange protocol in the standard model. 541-557 - Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi:
Certificateless and identity-based authenticated asymmetric group key agreement. 559-576
Volume 16, Number 6, November 2017
- Mehrdad Aliasgari, Marina Blanton, Fattaneh Bayatbabolghani:
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model. 577-601 - Lichun Li, Michael Militzer, Anwitaman Datta:
rPIR: ramp secret sharing-based communication-efficient private information retrieval. 603-625 - Alireza Esfahani, Georgios Mantas, Jonathan Rodriguez, José Carlos Neves:
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. 627-639 - Shahrzad Kananizadeh, Kirill Kononenko:
Development of dynamic protection against timing channels. 641-651 - Apostolos Malatras, Dimitris Geneiatakis, Ioannis Vakalis:
On the efficiency of user identification: a system-based approach. 653-671 - HyunChul Joh, Yashwant K. Malaiya:
Periodicity in software vulnerability discovery, patching and exploitation. 673-690
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.