Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
International Journal of Information Security
Title
Publication Date
Language
Citations
Efficient verifiable computation over quotient polynomial rings
2022/04/21
English
Restricting data-leakage using fine-grained access control on OSN objects
2022/11/01
English
Design and analysis of DDoS mitigating network architecture
2022/11/30
English
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow
2021/05/13
English
A systematic overview on methods to protect sensitive data provided for various analyses
2022/08/18
English
Outsourced cheating detection for secret sharing
2021/01/25
English
Enabling isolation and recovery in PLC redundancy framework of metro train systems
2021/01/04
English
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
2021/08/28
English
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain
2022/09/14
English
Developing non-interactive MPC with trusted hardware for enhanced security
2022/03/07
English
Wirelessly lockpicking a smart card reader
2014/04/02
English
Multi-operator wireless mesh networks secured by an all-encompassing security architecture
2014/05/22
English
Flowchart description of security primitives for controlled physical unclonable functions
2010/08/03
English
A new authentication model for ad hoc networks
2012/06/28
English
Message from the guest editors
2012/06/21
English
A delegation model for extended RBAC
2010/05/01
English
Special issue on the Security Track at the ACM Symposium on Applied Computing 2013
2015/04/01
English
Strongly simulation-extractable leakage-resilient NIZK
2015/05/19
English
Efficient parallelizable hashing using small non-compressing primitives
2015/04/29
English
Editorial
2001/08/01
English
Perceptual hash function for scalable video
2013/09/15
English
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks
2011/08/12
English
Preface to the special issue on ISC 2003
2005/02/03
English
On the sequence of authorization policy transformations
2005/02/01
English
A distributed digital rights management model for secure information-distribution systems
2004/11/01
English
Using ambients to control resources
2004/08/01
English
On the decidability of cryptographic protocols with open-ended data structures
2005/02/01
English
Requirements of federated trust management for service-oriented architectures
2007/06/21
English
Is workplace surveillance legal in Canada?
2007/06/19
English
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
2018/02/22
English
«
‹ Pervious
Next ›
»