International Journal of Information Security

Title Publication Date Language Citations
Message from the Guest Editors2016/01/25English
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol2016/01/02English
Password guessers under a microscope: an in-depth analysis to inform deployments2021/08/23English
Studying lattice reduction algorithms improved by quick reordering technique2020/05/13English
Optimization of parallel firewalls filtering rules2021/06/21English
[m]allotROPism: a metamorphic engine for malicious software variation development2021/03/03English
Improving the security of direct anonymous attestation under host corruptions2020/07/02English
Preface2006/03/08English
Hierarchical time-based information release2006/03/08English
Execution transactions for defending against software failures: use and evaluation2006/03/08English
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks2023/10/09English
Real-time detection of deception attacks in cyber-physical systems2023/03/29English
Preface to the special issue on ESORICS 20032005/06/01English
Preface to the special issue on PKI2004/01/01English
Theory and benefits of recursive certificate structures2004/01/01English
All sail, no anchor II: Acceptable high-end PKI2004/01/01English
An algebraic approach to the verification of a class of Diffie-Hellman protocols2007/02/08English
On security arguments of the second round SHA-3 candidates2012/02/11English
Conditional reactive simulatability2007/10/26English
Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR2007/08/10English
Preface2007/08/01English
Preface2007/06/27English
Message from the Guest Editors2011/05/25English
Editorial2007/11/20English
Erratum to: Dynamic subtree tracing and its application in pay-TV systems2011/07/09English
Analysis of e-commerce protocols: Adapting a traditional technique2003/11/01English
Distributing security-mediated PKI2005/07/19English
Public Key Infrastructure: Research and Applications2005/07/19English
Security analysis of CRT-based cryptosystems2006/02/07English
A systematic mapping study on security for systems of systems2023/10/18English