Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
International Journal of Information Security
Title
Publication Date
Language
Citations
Efficient attribute-based signature and signcryption realizing expressive access structures
2015/05/19
English
34
A generalization of Paillier’s public-key system with applications to electronic voting
2010/09/30
English
34
Secure floating point arithmetic and private satellite collision analysis
2014/12/18
English
33
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
2016/07/20
English
32
New facets of mobile botnet: architecture and evaluation
2015/12/31
English
32
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
2009/06/27
English
32
On detecting co-resident cloud instances using network flow watermarking techniques
2013/10/02
English
31
Talos: no more ransomware victims with formal methods
2017/12/19
English
30
Encouraging users to improve password security and memorability
2019/04/11
English
30
The MALICIA dataset: identification and analysis of drive-by download operations
2014/06/21
English
30
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection
2016/06/18
English
30
Content-based image authentication: current status, issues, and challenges
2009/10/08
English
29
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
2015/01/30
English
29
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation
2019/04/11
English
28
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
2011/08/24
English
27
User interface design affects security: patterns in click-based graphical passwords
2009/05/08
English
27
Requirements engineering for trust management: model, methodology, and reasoning
2006/08/16
English
27
Authentication in mobile devices through hand gesture recognition
2012/01/20
English
27
Intrusion and intrusion detection
2001/08/01
English
27
How to obtain full privacy in auctions
2006/03/31
English
27
Complete analysis of configuration rules to guarantee reliable network security policies
2007/10/16
English
26
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability
2019/09/03
English
26
Active authentication for mobile devices utilising behaviour profiling
2013/09/11
English
26
Secure group key establishment revisited
2007/02/21
English
25
A formalization of card-based cryptographic protocols via abstract machine
2013/11/22
English
25
A note on the Ate pairing
2008/05/20
English
24
Cyber security in New Space
2020/05/12
English
24
Flexible attribute-based encryption applicable to secure e-healthcare records
2015/01/13
English
24
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
2016/02/20
English
24
Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
2015/11/30
English
23
«
‹ Pervious
Next ›
»