default search action
International Journal of Information Security, Volume 11
Volume 11, Number 1, February 2012
- Dario Fiore, Rosario Gennaro, Nigel P. Smart:
Relations between the security models for certificateless encryption and ID-based key agreement. 1-22 - Kun Peng:
Threshold distributed access control with public verification: a practical application of PVSS. 23-31 - Mikaël Ates, Francesco Buccafurri, Jacques Fayolle, Gianluca Lax:
A warning on how to implement anonymous credential protocols into the information card framework. 33-40 - Yuanzhuo Wang, Min Yu, Jingyuan Li, Kun Meng, Chuang Lin, Xueqi Cheng:
Stochastic game net and applications in security analysis for enterprise network. 41-52 - Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
A new efficient optimistic fair exchange protocol without random oracles. 53-63
Volume 11, Number 2, April 2012
- Javier Guerra Casanova, Carmen Sánchez Ávila, Gonzalo Bailador, Alberto de Santos Sierra:
Authentication in mobile devices through hand gesture recognition. 65-83 - Koji Nuida:
Short collusion-secure fingerprint codes against three pirates. 85-102 - Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On security arguments of the second round SHA-3 candidates. 103-120 - Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, Yannis Soupionis:
Formal analysis for robust anti-SPIT protection using model checking. 121-135
Volume 11, Number 3, June 2012
- Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, Johannes Buchmann:
Selecting parameters for secure McEliece-based cryptosystems. 137-147 - Elena Andreeva, Bart Mennink, Bart Preneel:
The parazoa family: generalizing the sponge hash functions. 149-165 - Rinku Dewri, Indrajit Ray, Nayot Poolsappasit, L. Darrell Whitley:
Optimal security hardening on attack tree models of networks: a cost-benefit analysis. 167-188 - Ashok Kumar Das:
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. 189-211
Volume 11, Number 4, August 2012
- Irfan Ahmed, Martin Naedele, Bradley L. Schatz, Ryôichi Sasaki, Andrew West:
Message from the guest editors. 213 - Bradley Reaves, Thomas H. Morris:
An open virtual testbed for industrial control system security research. 215-229 - Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel:
A log mining approach for process monitoring in SCADA. 231-251 - Marc Solé, Victor Muntés-Mulero, Jordi Nin:
Efficient microaggregation techniques for large numerical data volumes. 253-267 - Qussai Yaseen, Brajendra Panda:
Insider threat mitigation: preventing unauthorized knowledge acquisition. 269-280 - Michael Huber:
Perfect secrecy systems immune to spoofing attacks. 281-289
Volume 11, Number 5, October 2012
- Jianying Zhou, Xuejia Lai, Hui Li:
Message from the Guest Editors. 291-292 - Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement attacks: automatically evading behavior-based software birthmark. 293-304 - Liqun Chen, Yu Chen:
The n-Diffie-Hellman problem and multiple-key encryption. 305-320 - Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos:
Minimizing information disclosure to third parties in social login platforms. 321-332 - Jovan Dj. Golic:
A new authentication model for ad hoc networks. 333-347 - Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo:
Strong accumulators from collision-resistant hashing. 349-363
Volume 11, Number 6, November 2012
- Alejandro Pérez-Méndez, Fernando Pereñíguez-Garcia, Rafael Marín López, Gabriel López Millán:
A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network. 365-388 - Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
New constructions of OSBE schemes and their applications in oblivious access control. 389-401 - Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson:
High-performance secure multi-party computation for data mining applications. 403-418 - Nasour Bagheri, Praveen Gauravaram, Lars R. Knudsen, Erik Zenner:
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. 419-434
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.