International Journal of Information Security

Title Publication Date Language Citations
Efficient attribute-based signature and signcryption realizing expressive access structures2015/05/19English34
A generalization of Paillier’s public-key system with applications to electronic voting2010/09/30English34
Secure floating point arithmetic and private satellite collision analysis2014/12/18English33
Detecting zero-day attacks using context-aware anomaly detection at the application-layer2016/07/20English32
New facets of mobile botnet: architecture and evaluation2015/12/31English32
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs2009/06/27English32
On detecting co-resident cloud instances using network flow watermarking techniques2013/10/02English31
Talos: no more ransomware victims with formal methods2017/12/19English30
Encouraging users to improve password security and memorability2019/04/11English30
The MALICIA dataset: identification and analysis of drive-by download operations2014/06/21English30
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection2016/06/18English30
Content-based image authentication: current status, issues, and challenges2009/10/08English29
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme2015/01/30English29
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation2019/04/11English28
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability2011/08/24English27
User interface design affects security: patterns in click-based graphical passwords2009/05/08English27
Requirements engineering for trust management: model, methodology, and reasoning2006/08/16English27
Authentication in mobile devices through hand gesture recognition2012/01/20English27
Intrusion and intrusion detection2001/08/01English27
How to obtain full privacy in auctions2006/03/31English27
Complete analysis of configuration rules to guarantee reliable network security policies2007/10/16English26
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability2019/09/03English26
Active authentication for mobile devices utilising behaviour profiling2013/09/11English26
Secure group key establishment revisited2007/02/21English25
A formalization of card-based cryptographic protocols via abstract machine2013/11/22English25
A note on the Ate pairing2008/05/20English24
Cyber security in New Space2020/05/12English24
Flexible attribute-based encryption applicable to secure e-healthcare records2015/01/13English24
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts2016/02/20English24
Efficient and verifiable algorithms for secure outsourcing of cryptographic computations2015/11/30English23