


default search action
International Journal of Information Security, Volume 17
Volume 17, Number 1, February 2018
- Alfredo Rial, George Danezis

, Markulf Kohlweiss
:
Privacy-preserving smart metering revisited. 1-31 - Hua Deng

, Yunya Zhou, Qianhong Wu, Bo Qin, Jianwei Liu:
Secure pay-TV for chained hotels. 33-42 - Kazuki Yoneyama:

Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs. 43-66 - Riccardo Bernardini

, Roberto Rinaldo:
Generalized Elias schemes for efficient harvesting of truly random bits. 67-81 - Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens, Frédéric Cuppens:

Achieving dynamicity in security policies enforcement using aspects. 83-103 - G. Deepa

, P. Santhi Thilagam
, Furqan Ahmed Khan, Amit Praseed
, Alwyn R. Pais
, Nushafreen Palsetia:
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications. 105-120
Volume 17, Number 2, April 2018
- Ankit Shah, Rajesh Ganesan, Sushil Jajodia

, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. 121-134 - Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi:

HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle. 135-151 - G. Kirubavathi Venkatesh

, R. Anitha:
Structural analysis and detection of android botnets using machine learning techniques. 153-167 - Aviv Gruber, Irad Ben-Gal:

Using targeted Bayesian network learning for suspect identification in communication networks. 169-181 - Tsung-Min Kuo

, Sung-Ming Yen, Meng-Che Han:
Dynamic reversed accumulator. 183-191 - Jae Hong Seo

, Keita Emura
, Keita Xagawa
, Kazuki Yoneyama:
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures. 193-220 - Aron Laszka

, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
A game-theoretic approach for integrity assurance in resource-bounded systems. 221-242
Volume 17, Number 3, June 2018
- Josep Domingo-Ferrer

, Alberto Blanco-Justicia
, Carla Ràfols
:
Dynamic group size accreditation and group discounts preserving anonymity. 243-260 - Ying Luo, Sen-Ching S. Cheung

, Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni:
Anonymous subject identification and privacy information management in video surveillance. 261-278 - Antoni Martínez-Ballesté, Hatem A. Rashwan

, Domenec Puig, Agusti Solanas
:
Design and implementation of a secure and trustworthy platform for privacy-aware video surveillance. 279-290 - Maryam Mehrnezhad

, Ehsan Toreini, Siamak F. Shahandashti
, Feng Hao
:
Stealing PINs via mobile sensors: actual risk versus user perception. 291-313 - Sangita Roy

, Ashok Singh Sairam
:
Distributed star coloring of network for IP traceback. 315-326 - Sebastian Faust, Carmit Hazay, Daniele Venturi

:
Outsourced pattern matching. 327-346 - Yujue Wang, HweeHwa Pang

, Robert H. Deng
:
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management. 347-363
Volume 17, Number 4, August 2018
- Francisco Javier González-Serrano

, Adrian Amor-Martin
, Jorge Casamayon-Anton:
Supervised machine learning using encrypted training data. 365-377 - HyoungMin Ham, JongHyup Lee, JooSeok Song:

Improved yoking proof protocols for preserving anonymity. 379-393 - Jean-Louis Lanet, Hélène Le Bouder, Mohammed Benattou

, Axel Legay:
When time meets test. 395-409 - Syed Taha Ali

, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao
:
ZombieCoin 2.0: managing next-generation botnets using Bitcoin. 411-422 - Zheng Yang

, Chao Liu, Wanping Liu, Daigu Zhang, Song Luo:
A new strong security model for stateful authenticated group key exchange. 423-440 - Miguel Morales-Sandoval

, José Luis González
, Arturo Diaz-Perez, Víctor Jesús Sosa Sosa
:
A pairing-based cryptographic approach for data security in the cloud. 441-461 - Yinhao Jiang

, Willy Susilo
, Yi Mu, Fuchun Guo
:
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts. 463-475 - Hongyong Jia, Yue Chen, Julong Lan, Kaixiang Huang, Jun Wang:

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators. 477-490
Volume 17, Number 5, October 2018
- Liqun Chen

, Jinguang Han
, Chris J. Mitchell:
Message from the Guest Editors. 491-492 - Kazuya Imamura

, Kazuhiko Minematsu, Tetsu Iwata
:
Integrity analysis of authenticated encryption based on stream ciphers. 493-511 - Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto:

Multi-cast key distribution: scalable, dynamic and provably secure construction. 513-532 - Yinhao Jiang

, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes. 533-548 - Yuxi Li, Fucai Zhou, Yuhai Qin, Muqing Lin, Zifeng Xu:

Integrity-verifiable conjunctive keyword searchable encryption in cloud storage. 549-568
- Carlos Ribeiro, Herbert Leitold, Simon Esposito, David Mitzam:

STORK: a real, heterogeneous, large-scale eID management system. 569-585 - Franco Frattolillo

:
Watermarking protocols: an excursus to motivate a new approach. 587-601 - Lanfranco Lopriore:

Access right management by extended password capabilities. 603-612
Volume 17, Number 6, November 2018
- Ehab ElSalamouny

, Sébastien Gambs:
Optimal noise functions for location privacy on continuous regions. 613-630 - Keisuke Murakami, Takeaki Uno:

Optimization algorithm for k-anonymization of datasets with low information loss. 631-644 - Nolen Scaife

, Henry Carter
, Lyrissa Lidsky
, Rachael L. Jones, Patrick Traynor:
OnionDNS: a seizure-resistant top-level domain. 645-660 - Daiki Chiba

, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori
, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. 661-680 - Gaute Wangen, Christoffer Hallstensen, Einar Snekkenes:

A framework for estimating information security risk assessment method completeness - Core Unified Risk Framework, CURF. 681-699 - Nina Bindel

, Johannes Buchmann, Susanne Rieß:
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols. 701-718 - Aniello Cimitile, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio:

Talos: no more ransomware victims with formal methods. 719-738

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














