The Elliptic Curve Digital Signature Algorithm (ECDSA) | 2001/08/01 | English | 664 |
OFMC: A symbolic model checker for security protocols | 2005/06/01 | English | 180 |
Identity-based key agreement protocols from pairings | 2007/01/11 | English | 143 |
Security issues in cloud environments: a survey | 2013/09/28 | English | 125 |
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation | 2014/11/29 | English | 110 |
Opacity generalised to transition systems | 2008/05/21 | English | 107 |
Game strategies in network security | 2005/02/01 | English | 102 |
Authenticating mobile phone users using keystroke analysis | 2006/08/01 | English | 90 |
Efficient online/offline identity-based signature for wireless sensor network | 2010/06/05 | English | 68 |
Edit automata: enforcement mechanisms for run-time security policies | 2005/02/01 | English | 66 |
High-performance secure multi-party computation for data mining applications | 2012/09/09 | English | 65 |
Malware analysis using visualized images and entropy graphs | 2014/04/29 | English | 62 |
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems | 2019/08/29 | English | 60 |
Secure outsourcing of sequence comparisons | 2005/03/08 | English | 56 |
A novel scalable intrusion detection system based on deep learning | 2020/06/15 | English | 55 |
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks | 2012/04/18 | English | 52 |
A survey of certificateless encryption schemes and security models | 2008/05/24 | English | 52 |
Password hardening based on keystroke dynamics | 2002/02/01 | | 48 |
Building online trust through privacy practices | 2007/07/03 | English | 46 |
A novel graph-based approach for IoT botnet detection | 2019/10/23 | English | 46 |
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage | 2014/08/29 | English | 43 |
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations | 2021/03/19 | English | 43 |
A context-aware robust intrusion detection system: a reinforcement learning-based approach | 2019/12/03 | English | 41 |
A framework for estimating information security risk assessment method completeness | 2017/06/28 | English | 41 |
Optimal security hardening on attack tree models of networks: a cost-benefit analysis | 2012/03/29 | English | 38 |
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques | 2014/07/20 | English | 38 |
Principles of remote attestation | 2011/04/23 | English | 38 |
Lightweight multi-factor mutual authentication protocol for IoT devices | 2019/12/13 | English | 37 |
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains | 2022/04/07 | English | 36 |
Alambic: a privacy-preserving recommender system for electronic commerce | 2008/02/27 | English | 35 |