default search action
International Journal of Information Security, Volume 15
Volume 15, Number 1, February 2016
- Liang Liu, Xiaofeng Chen, Wenjing Lou:
Secure three-party computational protocols for triangle area. 1-13 - Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more. 15-33 - Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yan Li:
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption. 35-50 - Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nicolas T. Courtois:
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations. 51-65 - Yuyu Wang, Keisuke Tanaka:
Strongly simulation-extractable leakage-resilient NIZK. 67-79 - Y. Sreenivasa Rao, Ratna Dutta:
Efficient attribute-based signature and signcryption realizing expressive access structures. 81-109
Volume 15, Number 2, April 2016
- Ronald De Keulenaer, Jonas Maebe, Koen De Bosschere, Bjorn De Sutter:
Link-time smart card code hardening. 111-130 - Randa Jabeur Ben Chikha, Tarek Abbes, Wassim Ben Chikha, Adel Bouhoula:
Behavior-based approach to detect spam over IP telephony attacks. 131-143 - Vahid R. Karimi, Paulo S. C. Alencar, Donald D. Cowan:
A uniform approach for access control and business models with explicit rule realization. 145-171 - Elie Raad, Bechara al Bouna, Richard Chbeir:
Preventing sensitive relationships disclosure for better social media preservation. 173-194 - Alberto Huertas Celdrán, Ginés Dólera Tormo, Félix Gómez Mármol, Manuel Gil Pérez, Gregorio Martínez Pérez:
Resolving privacy-preserving relationships over outsourced encrypted data storages. 195-209 - Víctor Mateu, Josep M. Miret, Francesc Sebé:
A hybrid approach to vector-based homomorphic tallying remote voting. 211-221 - Guomin Yang, Willy Susilo, Yi Mu:
Message from the Guest Editors. 223-224
Volume 15, Number 3, June 2016
- Hatem A. Rashwan, Agusti Solanas, Domenec Puig, Antoni Martínez-Ballesté:
Understanding trust in privacy-aware video surveillance systems. 225-234 - Tytus Kurek, Marcin Niemiec, Artur Lason:
Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality. 235-250 - Cengiz Örencik, Ayse Selcuk, Erkay Savas, Murat Kantarcioglu:
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation. 251-269 - Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Broadcast encryption with dealership. 271-283 - Bart Mennink, Bart Preneel:
Efficient parallelizable hashing using small non-compressing primitives. 285-300 - Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
Detection of firewall configuration errors with updatable tree. 301-317 - P. Salini, S. Kanmani:
Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems. 319-334
Volume 15, Number 4, August 2016
- Leyli Javid Khayati, Cengiz Örencik, Erkay Savas, Berkant Ustaoglu:
A practical privacy-preserving targeted advertising scheme for IPTV users. 335-360 - Qiguang Miao, Jiachen Liu, Ying Cao, Jianfeng Song:
Malware detection using bilayer behavior abstraction and improved one-class support vector machines. 361-379 - Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: evidence-based subjective logic. 381-402 - István Vajda:
On the analysis of time-aware protocols in universal composability framework. 403-412 - Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty:
A cryptographic study of tokenization systems. 413-432 - Avleen Kaur Malhi, Shalini Batra:
Privacy-preserving authentication framework using bloom filter for secure vehicular communications. 433-453
Volume 15, Number 5, October 2016
- Marios Anagnostopoulos, Georgios Kambourakis, Stefanos Gritzalis:
New facets of mobile botnet: architecture and evaluation. 455-473 - Abdullah Almaatouq, Erez Shmueli, Mariam Nouh, Ahmad Alabdulkareem, Vivek K. Singh, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex 'Sandy' Pentland:
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. 475-491 - Marina Blanton, Everaldo Aguiar:
Private and oblivious set and multiset operations. 493-518 - Mehmet Sabir Kiraz, Osmanbey Uzunkol:
Efficient and verifiable algorithms for secure outsourcing of cryptographic computations. 519-537 - Changhui Hu, Lidong Han:
Efficient wildcard search over encrypted data. 539-547 - Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-specific encryption from forward-secure encryption: generic and direct constructions. 549-571
Volume 15, Number 6, November 2016
- Liqun Chen, Chris J. Mitchell:
Message from the guest editors. 573-574 - Paul D. Rowe, Joshua D. Guttman, Moses D. Liskov:
Measuring protocol strength with security goals. 575-596 - Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham:
Secure modular password authentication for the web using channel bindings. 597-620 - Christopher W. Brown, Michael Jenkins:
Analyzing proposals for improving authentication on the TLS-/SSL-protected Web. 621-635 - Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol. 637-657 - Cas Cremers, Marko Horvat:
Improving the ISO/IEC 11770 standard for key management techniques. 659-673
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.