default search action
International Journal of Information Security, Volume 14
Volume 14, Number 1, February 2015
- Kyoung-Soo Han, Jae Hyun Lim, Boojoong Kang, Eul Gyu Im:
Malware analysis using visualized images and entropy graphs. 1-14 - Antonio Nappa, M. Zubair Rafique, Juan Caballero:
The MALICIA dataset: identification and analysis of drive-by download operations. 15-33 - Helber Silva, Aldri Santos, Michele Nogueira:
Routing management for performance and security tradeoff in wireless mesh networks. 35-46 - Egor Dolzhenko, Jay Ligatti, Srikar Reddy:
Modeling runtime enforcement with mandatory results automata. 47-60 - Michael L. Valenzuela, Ferenc Szidarovszky, Jerzy W. Rozenblit:
A multiresolution approach for optimal defense against random attacks. 61-72 - Rafael Tonicelli, Anderson C. A. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, Akira Otsuka:
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model. 73-84 - Alex Arbit, Yoel Livne, Yossef Oren, Avishai Wool:
Implementing public-key cryptography on passive RFID tags is practical. 85-99
Volume 14, Number 2, April 2015
- Giampaolo Bella, Helge Janicke:
Special issue on the Security Track at the ACM Symposium on Applied Computing 2013. 101-102 - Jean Everson Martina, Eduardo dos Santos, Marcelo Carlomagno Carlos, Geraint Price, Ricardo Felipe Custódio:
An adaptive threat model for security ceremonies. 103-121 - Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Formal modeling and automatic enforcement of Bring Your Own Device policies. 123-140 - Michael Spreitzenbarth, Thomas Schreck, Florian Echtler, Daniel Arp, Johannes Hoffmann:
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques. 141-153 - Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani, Matthias Hollick:
Lightweight energy consumption-based intrusion detection system for wireless sensor networks. 155-167 - André Egners, Patrick Herrmann, Ulrike Meyer:
Multi-operator wireless mesh networks secured by an all-encompassing security architecture. 169-186 - Jean Everson Martina, Lawrence C. Paulson:
Verifying multicast-based security protocols using the inductive method. 187-204
Volume 14, Number 3, June 2015
- Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detection and analysis of eavesdropping in anonymous communication networks. 205-220 - Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of two authorization protocols using Colored Petri Nets. 221-247 - Joshua I. James, Pavel Gladyshev:
Automated inference of past action instances in digital investigations. 249-261 - Dennis Giffhorn, Gregor Snelting:
A new algorithm for low-deterministic security. 263-287 - Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis:
GPU-assisted malware. 289-297
Volume 14, Number 4, August 2015
- Nikolaos Pitropakis, Aggelos Pikrakis, Costas Lambrinoudakis:
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments. 299-305 - Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo, Liju Dong:
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. 307-318 - Marco Casassa Mont, Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio:
Towards safer information sharing in the cloud. 319-334 - Andreu Pere Isern-Deyà, Llorenç Huguet i Rotger, Magdalena Payeras-Capellà, Macià Mut Puigserver:
On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform. 335-345 - Tanveer Mustafa, Karsten Sohr:
Understanding the implemented access control policy of Android system services with slicing and extended static checking. 347-366 - Abdeljebar Ameziane El Hassani, Anas Abou El Kalam, Adel Bouhoula, Ryma Abassi, Abdellah Ait Ouahman:
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity. 367-385 - Mohammed I. Al-Saleh, Fatima M. AbuHjeela, Ziad A. Al-Sharif:
Investigating the detection capabilities of antiviruses under concurrent attacks. 387-396
Volume 14, Number 5, October 2015
- Lei Wei, Michael K. Reiter:
Toward practical encrypted email that supports private, regular-expression searches. 397-416 - Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Generic constructions for role-based encryption. 417-430 - Han-Yu Lin:
RPCAE: a novel revocable proxy convertible authenticated encryption scheme. 431-441 - Tzipora Halevi, Nitesh Saxena:
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios. 443-456 - Tao Li, Aiqun Hu:
Trusted mobile model based on DTE technology. 457-469 - Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux, Said Oulmakhzoune:
Deployment of a posteriori access control using IHE ATNA. 471-483
Volume 14, Number 6, November 2015
- Elisa Bertino, Robert H. Deng, Xinyi Huang, Jianying Zhou:
Security and privacy of electronic health information systems. 485-486 - Huiling Qian, Jiguo Li, Yichen Zhang, Jinguang Han:
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. 487-497 - Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou:
Flexible attribute-based encryption applicable to secure e-healthcare records. 499-511 - Mohammad Ali Hadavi, Rasool Jalili, Ernesto Damiani, Stelvio Cimato:
Security and searchability in secret sharing-based data outsourcing. 513-529 - Liina Kamm, Jan Willemson:
Secure floating point arithmetic and private satellite collision analysis. 531-548 - Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. 549-560 - Alice J. Kozakevicius, Cristian Cappo, Bruno Augusti Mozzaquatro, Raul Ceretta Nunes, Christian E. Schaerer:
URL query string anomaly sensor designed with the bidimensional Haar wavelet transform. 561-581
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.