International Journal of Information Security

Title Publication Date Language Citations
Security bug reports classification using fasttext2023/12/22English
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review2024/01/12English
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm2024/01/27English
Narrow privacy and desynchronization in Vaudenay’s RFID model2021/10/05English
An SSH predictive model using machine learning with web proxy session logs2021/06/11English
A language and a pattern system for temporal property specification: advanced metering infrastructure case study2020/01/09English
Multi-cast key distribution: scalable, dynamic and provably secure construction2017/08/04English
Improved yoking proof protocols for preserving anonymity2017/06/22English
OnionDNS: a seizure-resistant top-level domain2017/10/24English
Hiding information against structural re-identification2018/02/13English
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy2018/03/07English
A new strong security model for stateful authenticated group key exchange2017/04/17English
Trusted mobile model based on DTE technology2014/10/24English
Verifying multicast-based security protocols using the inductive method2014/08/08English
Message from the guest editors2016/10/08English
Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs2016/10/06English
PiSHi: click the images and I tell if you are a human2016/02/02English
HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms2016/07/06English
Unmasking the common traits: an ensemble approach for effective malware detection2024/04/30English
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things2024/04/30English
Preventing sensitive relationships disclosure for better social media preservation2015/02/22English
Message from the guest editors2019/10/12English
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets2019/09/05English
Message from the Guest Editors2018/07/19English
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices2019/11/27English
Automated benchmark network diversification for realistic attack simulation with application to moving target defense2021/05/31English
Topology-hiding garbled circuits without universal circuits2021/06/26English
Algorithm substitution attacks against receivers2022/06/21English
Track for surveys2021/03/25English
Coin-based Secure Computations2022/04/06English