


default search action
International Journal of Information Security, Volume 8
Volume 8, Number 1, February 2009
- Jiqiang Lu:

Related-key rectangle attack on 36 rounds of the XTEA block cipher. 1-11 - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:

Bipartite modular multiplication with twice the bit-length of multipliers. 13-23 - Daxin Tian, Yanheng Liu, Yang Xiang

:
Large-scale network intrusion detection based on distributed learning algorithm. 25-35 - Jiin-Chiou Cheng, Chi-Sung Laih:

Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. 37-48 - Atefeh Mashatan

, Douglas R. Stinson:
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. 49-60 - Maithili Narasimha, John Solis, Gene Tsudik:

Privacy-preserving revocation checking. 61-75
Volume 8, Number 2, April 2009
- Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar H. Khan

, John A. MacDonald:
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. 77-87 - Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu:

Denial of service attacks and defenses in decentralized trust management. 89-101 - Karl Quinn, David Lewis

, Declan O'Sullivan
, Vincent P. Wade:
An analysis of accuracy experiments carried out over of a multi-faceted model of trust. 103-119 - Eugene Y. Vasserman

, Nicholas Hopper, James Tyra:
Silent Knock : practical, provably undetectable authentication. 121-135 - David W. Chadwick

, Sassa Otenko, Tuan-Anh Nguyen:
Adding support to XACML for multi-domain user to user dynamic delegation of authority. 137-152
Volume 8, Number 3, June 2009
- Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh:

Intrusion detection in voice over IP environments. 153-172 - Gabriel M. Kuper, Fabio Massacci

, Nataliya Rassadko:
Generalized XML security views. 173-203 - Lein Harn, Jian Ren

, Changlu Lin:
Efficient identity-based GQ multisignatures. 205-210 - Debra L. Cook, Moti Yung, Angelos D. Keromytis:

Elastic block ciphers: method, security and instantiations. 211-231
Volume 8, Number 4, August 2009
- Sourour Meharouech, Adel Bouhoula

, Tarek Abbes:
Ensuring security in depth based on heterogeneous network security technologies. 233-246 - Abdelrahman Desoky:

Listega: list-based steganography methodology. 247-261 - Sangho Lee, Jong Kim, Sung Je Hong:

Redistributing time-based rights between consumer devices for content sharing in DRM system. 263-273 - Richard Shay, Elisa Bertino:

A comprehensive simulation tool for the analysis of password policies. 275-289 - Hristo Koshutanski

, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
:
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. 291-314
Volume 8, Number 5, October 2009
- Ernie Brickell, Liqun Chen

, Jiangtao Li:
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. 315-330 - Fernando Esponda, Stephanie Forrest

, Paul Helman:
Negative representations of information. 331-345 - Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro:

On the pseudo-freeness and the CDH assumption. 347-355 - Erel Geron, Avishai Wool

:
CRUST: cryptographic remote untrusted storage without public keys. 357-377 - Huawang Qin, Yuewei Dai, Zhiquan Wang:

A secret sharing scheme based on (t, n) threshold and adversary structure. 379-385
Volume 8, Number 6, December 2009
- Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot

:
User interface design affects security: patterns in click-based graphical passwords. 387-398 - Christian Hammer

, Gregor Snelting:
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. 399-422 - Xiangdong An

, Dawn N. Jutla, Nick Cercone, Charnyote Pluempitiwiriyawej, Hai Wang:
Uncertain inference control in privacy protection. 423-431 - Hedieh Sajedi

, Mansour Jamzad:
Secure steganography based on embedding capacity. 433-445 - Rainer Plaga:

Biometric keys: suitable use cases and achievable information content. 447-454 - Mario Kozina, Marin Golub, Stjepan Gros:

A method for identifying Web applications. 455-467

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














