default search action
International Journal of Information Security, Volume 20
Volume 20, Number 1, February 2021
- Iraklis Leontiadis, Ming Li:
Secure and collusion-resistant data aggregation from convertible tags. 1-20 - Daniel Schlette, Fabian Böhm, Marco Caselli, Günther Pernul:
Measuring and visualizing cyber threat intelligence quality. 21-38 - Mohamed A. El-Zawawy, Eleonora Losiouk, Mauro Conti:
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps. 39-58 - Pengfei Liu, Weiping Wang, Xi Luo, Haodong Wang, Chushu Liu:
NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs. 59-71 - Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Obfuscated integration of software protections. 73-101 - Huiwen Jia, Chunming Tang:
Cryptanalysis of a non-interactive deniable ring signature scheme. 103-112 - Prajna Deshanta Ibnugraha, Lukito Edi Nugroho, Paulus Insap Santosa:
Risk model development for information security in organization environment based on business perspectives. 113-126
Volume 20, Number 2, April 2021
- Wenjuan Li, Yu Wang, Jin Li, Man Ho Au:
Toward a blockchain-based framework for challenge-based collaborative intrusion detection. 127-139 - Jia Xu, Jianying Zhou:
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext. 141-159 - Abu Faisal, Mohammad Zulkernine:
A secure architecture for TCP/UDP-based cloud communications. 161-179 - Jesus Solano, Luis David Camacho, Alejandro Correa, Claudio Deiro, Javier Vargas, Martín Ochoa:
Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications. 181-197
- Sanjit Chatterjee, Manish Kesarwani, Jayam Modi, Sayantan Mukherjee, Shravan Kumar Parshuram Puria, Akash Shah:
Secure and efficient wildcard search over encrypted data. 199-244 - Cristóbal Medina-López, Leocadio González Casado, Vicente González Ruiz, Yuansong Qiao:
An SDN approach to detect targeted attacks in P2P fully connected overlays. 245-255 - Yuntao Wang, Tsuyoshi Takagi:
Studying lattice reduction algorithms improved by quick reordering technique. 257-268
Volume 20, Number 3, June 2021
- Abdelmadjid Benarfa, Muhammad Hassan, Eleonora Losiouk, Alberto Compagno, Mohamed Bachir Yagoubi, Mauro Conti:
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN. 269-285 - Mark Manulis, Christopher P. Bridges, R. Harrison, Venkkatesh Sekar, Andy Davis:
Cyber security in New Space. 287-311 - Harel Berger, Amit Z. Dvir, Moti Geva:
A wrinkle in time: a case study in DNS poisoning. 313-329 - Soo-Yeon Ji, Bong-Keun Jeong, Dong Hyun Jeong:
Evaluating visualization approaches to detect abnormal activities in network traffic data. 331-345 - Georgios P. Spathoulas, Georgios Theodoridis, Georgios-Paraskevas Damiris:
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts. 347-370 - Gregorio Pitolli, Giuseppe Laurenza, Leonardo Aniello, Leonardo Querzoni, Roberto Baldoni:
MalFamAware: automatic family identification and malware classification through online clustering. 371-386 - Soosan Naderi Mighan, Mohsen Kahani:
A novel scalable intrusion detection system based on deep learning. 387-403 - Mriganka Mandal:
Anonymity in traceable cloud data broadcast system with simultaneous individual messaging. 405-430 - Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob:
Efficient attribute-based encryption with repeated attributes optimization. 431-444 - Leonardo Aniello, Basel Halak, Peter Chai, Riddhi Dhall, Mircea Mihalea, Adrian Wilczynski:
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF. 445-460
Volume 20, Number 4, August 2021
- Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto:
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes. 461-473 - Hyoseung Kim, Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
Improving the security of direct anonymous attestation under host corruptions. 475-492 - Mouna Jouini, Latifa Ben Arfa Rabai, Ridha Khédri:
A quantitative assessment of security risks based on a multifaceted classification approach. 493-510 - Fatemeh Deldar, Mahdi Abadi:
Enhancing spatial and temporal utilities in differentially private moving objects database release. 511-533 - Kun Bi, Dezhi Han, Guichen Zhang, Kuan-Ching Li, Aniello Castiglione:
K maximum probability attack paths generation algorithm for target nodes in networked systems. 535-551 - Thomas Sermpinis, George Vlahavas, Konstantinos Karasavvas, Athena Vakali:
DeTRACT: a decentralized, transparent, immutable and open PKI certificate framework. 553-570 - Davide Ferraris, Daniel Bastos, M. Carmen Fernández Gago, Fadi El-Moussa:
A trust model for popular smart home devices. 571-587 - Tian-Fu Lee, Hong-Ze Li, Yi-Pei Hsieh:
A blockchain-based medical data preservation scheme for telecare medical information systems. 589-601 - Trushna Parida, Suvrojit Das:
PageDumper: a mechanism to collect page table manipulation information at run-time. 603-619 - Mikaela Ngamboé, Paul Berthier, Nader Ammari, Katia Dyrda, José M. Fernandez:
Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED). 621-645
Volume 20, Number 5, October 2021
- Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez Martínez:
A context-centered methodology for IoT forensic investigations. 647-673 - Liqun Chen, Kaibin Huang, Mark Manulis, Venkkatesh Sekar:
Password-authenticated searchable encryption. 675-693 - Sabrina Sicari, Alessandra Rizzardi, Gianluca Dini, Pericle Perazzo, Michele La Manna, Alberto Coen-Porisini:
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware. 695-713 - Ricard Borges, Francesc Sebé:
An efficient privacy-preserving pay-by-phone system for regulated parking areas. 715-727 - Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Evaluating card-based protocols in terms of execution time. 729-740 - Florian Menges, Benedikt Putz, Günther Pernul:
DEALER: decentralized incentives for threat intelligence reporting and exchange. 741-761 - Federica Granese, Daniele Gorla, Catuscia Palamidessi:
Enhanced models for privacy and utility in continuous-time diffusion networks. 763-782
Volume 20, Number 6, December 2021
- Edwin Franco Myloth Josephlal, Sridhar Adepu, Zheng Yang, Jianying Zhou:
Enabling isolation and recovery in PLC redundancy framework of metro train systems. 783-795 - Huseyin Alecakir, Burcu Can, Sevil Sen:
Attention: there is an inconsistency between android permissions and application metadata! 797-815 - Pal-Stefan Murvay, Lucian Popa, Bogdan Groza:
Securing the controller area network with covert voltage channels. 817-831 - Yuta Imamura, Rintaro Orito, Hiroyuki Uekawa, Kritsana Chaikaew, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi:
Web access monitoring mechanism via Android WebView for threat analysis. 833-847 - Benjamin Yankson:
Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys. 849-869 - Louis Cianciullo, Hossein Ghodosi:
Outsourced cheating detection for secret sharing. 871-878 - Charlotte Bonte, Nigel P. Smart, Titouan Tanguy:
Thresholdizing HashEdDSA: MPC to the Rescue. 879-894
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.