International Journal of Information Security

Title Publication Date Language Citations
Efficient verifiable computation over quotient polynomial rings2022/04/21English
Restricting data-leakage using fine-grained access control on OSN objects2022/11/01English
Design and analysis of DDoS mitigating network architecture2022/11/30English
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow2021/05/13English
A systematic overview on methods to protect sensitive data provided for various analyses2022/08/18English
Outsourced cheating detection for secret sharing2021/01/25English
Enabling isolation and recovery in PLC redundancy framework of metro train systems2021/01/04English
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures2021/08/28English
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain2022/09/14English
Developing non-interactive MPC with trusted hardware for enhanced security2022/03/07English
Wirelessly lockpicking a smart card reader2014/04/02English
Multi-operator wireless mesh networks secured by an all-encompassing security architecture2014/05/22English
Flowchart description of security primitives for controlled physical unclonable functions2010/08/03English
A new authentication model for ad hoc networks2012/06/28English
Message from the guest editors2012/06/21English
A delegation model for extended RBAC2010/05/01English
Special issue on the Security Track at the ACM Symposium on Applied Computing 20132015/04/01English
Strongly simulation-extractable leakage-resilient NIZK2015/05/19English
Efficient parallelizable hashing using small non-compressing primitives2015/04/29English
Editorial2001/08/01English
Perceptual hash function for scalable video2013/09/15English
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks2011/08/12English
Preface to the special issue on ISC 20032005/02/03English
On the sequence of authorization policy transformations2005/02/01English
A distributed digital rights management model for secure information-distribution systems2004/11/01English
Using ambients to control resources2004/08/01English
On the decidability of cryptographic protocols with open-ended data structures2005/02/01English
Requirements of federated trust management for service-oriented architectures2007/06/21English
Is workplace surveillance legal in Canada?2007/06/19English
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM2018/02/22English