


default search action
International Journal of Information Security, Volume 13
Volume 13, Number 1, February 2014
- Qi Liao, Zhen Li:

Portfolio optimization of computer and mobile botnets. 1-14 - Takaaki Mizuki

, Hiroki Shizuya:
A formalization of card-based cryptographic protocols via abstract machine. 15-23 - Mark Manulis

, Bertram Poettering, Douglas Stebila
:
Plaintext awareness in identity-based key encapsulation. 25-49 - Keita Emura

, Goichiro Hanaoka
, Yusuke Sakai, Jacob C. N. Schuldt:
Group signature implies public-key encryption with non-interactive opening. 51-62 - Gustavo Gonzalez Granadillo, Malek Belhaouane, Hervé Debar

, Grégoire Jacob:
RORI-based countermeasure selection using the OrBAC formalism. 63-79 - Navajit Saikia, Prabin Kumar Bora:

Perceptual hash function for scalable video. 81-93
Volume 13, Number 2, April 2014
- Security in cloud computing. 95-96

- Antonios Gouglidis, Ioannis Mavridis

, Vincent C. Hu
:
Security policy verification for multi-domains in cloud systems. 97-111 - Diogo A. B. Fernandes, Liliana F. B. Soares, João V. P. Gomes, Mário M. Freire

, Pedro R. M. Inácio
:
Security issues in cloud environments: a survey. 113-170 - Adam Bates

, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler
:
On detecting co-resident cloud instances using network flow watermarking techniques. 171-189 - Aiiad Albeshri

, Colin Boyd, Juan Manuel González Nieto:
Enhanced GeoProof: improved geographic assurance for data in the cloud. 191-198 - David Nuñez

, Isaac Agudo
:
BlindIdM: A privacy-preserving approach for identity management as a service. 199-215
Volume 13, Number 3, June 2014
- Nikos Mavrogiannopoulos

, Andreas Pashalidis, Bart Preneel
:
Toward a secure Kerberos key exchange with smart cards. 217-228 - Fudong Li, Nathan L. Clarke

, Maria Papadaki
, Paul Dowland
:
Active authentication for mobile devices utilising behaviour profiling. 229-244 - Tzong-Sun Wu, Ming-Lun Lee, Han-Yu Lin, Chao-Yuan Wang:

Shoulder-surfing-proof graphical password authentication scheme. 245-254 - Chengpo Mu, Meng Yu

, Yingjiu Li, Wanyu Zang:
Risk balance defense approach against intrusions for network server. 255-269 - Bin Lian, Gongliang Chen, Jianhua Li:

Provably secure E-cash system with practical and efficient complete tracing. 271-289 - Robert P. McEvoy, Michael Tunstall

, Claire Whelan, Colin C. Murphy, William P. Marnane
:
All-or-Nothing Transforms as a countermeasure to differential side-channel analysis. 291-304
Volume 13, Number 4, August 2014
- Kee Sung Kim, Ik Rae Jeong:

Efficient verifiably encrypted signatures from lattices. 305-314 - Reza Sepahi, Ron Steinfeld, Josef Pieprzyk

:
Lattice-based certificateless public-key encryption in the standard model. 315-333 - Guido Bertoni

, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Sufficient conditions for sound tree and sequential hashing modes. 335-353 - Amerah Alabrah, Jeffrey Cashion, Mostafa A. Bassiouni:

Enhancing security of cookie-based sessions in mobile networks using sparse caching. 355-366 - Alireza Shameli-Sendi, Michel R. Dagenais:

ARITO: Cyber-attack response system using accurate risk impact tolerance. 367-390 - Mousa Mousazadeh, Behrouz Tork Ladani

:
Randomized gossip algorithms under attack. 391-402
Volume 13, Number 5, October 2014
- Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult:

Wirelessly lockpicking a smart card reader. 403-420 - Luigi Catuogno

, Clemente Galdi
:
Analysis of a two-factor graphical password scheme. 421-437 - Meng Zhang, Anand Raghunathan

, Niraj K. Jha:
A defense framework against malware and vulnerability exploits. 439-452 - Rehana Yasmin

, Eike Ritter, Guilin Wang:
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks. 453-465 - Weizheng Gao, Kashi Neupane, Rainer Steinwandt:

Tuning a two-round group key agreement. 467-476 - Sooyeon Shin, Taekyoung Kwon:

AAnA: Anonymous authentication and authorization based on short traceable signatures. 477-495
Volume 13, Number 6, November 2014
- Javier Herranz

, Jordi Nin
:
Secure and efficient anonymization of distributed confidential databases. 497-512 - Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:

Anonymity guarantees of the UMTS/LTE authentication and connection protocol. 513-527 - Meilof Veeningen, Benne de Weger, Nicola Zannone

:
Data minimisation in communication protocols: a formal analysis framework and application to identity management. 529-569 - Vladimir Jovanovikj, Dusan Gabrijelcic, Tomaz Klobucar

:
A conceptual model of security context. 571-581 - Sevil Sen

:
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection. 583-590

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














