International Journal of Information Security

Title Publication Date Language Citations
The Elliptic Curve Digital Signature Algorithm (ECDSA)2001/08/01English664
OFMC: A symbolic model checker for security protocols2005/06/01English180
Identity-based key agreement protocols from pairings2007/01/11English143
Security issues in cloud environments: a survey2013/09/28English125
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation2014/11/29English110
Opacity generalised to transition systems2008/05/21English107
Game strategies in network security2005/02/01English102
Authenticating mobile phone users using keystroke analysis2006/08/01English90
Efficient online/offline identity-based signature for wireless sensor network2010/06/05English68
Edit automata: enforcement mechanisms for run-time security policies2005/02/01English66
High-performance secure multi-party computation for data mining applications2012/09/09English65
Malware analysis using visualized images and entropy graphs2014/04/29English62
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems2019/08/29English60
Secure outsourcing of sequence comparisons2005/03/08English56
A novel scalable intrusion detection system based on deep learning2020/06/15English55
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks2012/04/18English52
A survey of certificateless encryption schemes and security models2008/05/24English52
Password hardening based on keystroke dynamics2002/02/0148
Building online trust through privacy practices2007/07/03English46
A novel graph-based approach for IoT botnet detection2019/10/23English46
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage2014/08/29English43
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations2021/03/19English43
A context-aware robust intrusion detection system: a reinforcement learning-based approach2019/12/03English41
A framework for estimating information security risk assessment method completeness2017/06/28English41
Optimal security hardening on attack tree models of networks: a cost-benefit analysis2012/03/29English38
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques2014/07/20English38
Principles of remote attestation2011/04/23English38
Lightweight multi-factor mutual authentication protocol for IoT devices2019/12/13English37
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains2022/04/07English36
Alambic: a privacy-preserving recommender system for electronic commerce2008/02/27English35