default search action
International Journal of Information Security, Volume 1
Volume 1, Number 1, August 2001
- Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto:
Editorial. 1-2 - Carl E. Landwehr:
Computer security. 3-13 - John McHugh:
Intrusion and intrusion detection. 14-35 - Don Johnson, Alfred Menezes, Scott A. Vanstone:
The Elliptic Curve Digital Signature Algorithm (ECDSA). 36-63 - Carlo Blundo, Paolo D'Arco, Alfredo De Santis:
A t-private k-database information retrieval scheme. 64-68
Volume 1, Number 2, February 2002
- Fabian Monrose, Michael K. Reiter, Susanne Wetzel:
Password hardening based on keystroke dynamics. 69-83 - Ohad Rodeh, Kenneth P. Birman, Danny Dolev:
Using AVL trees for fault-tolerant group key management. 84-99 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
Securing SOAP e-services. 100-115 - Michiharu Kudo:
PBAC: Provision-based access control model. 116-130 - Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki:
A complete characterization of a family of key exchange protocols. 131-142
Volume 1, Number 3, November 2002
- Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit:
Attacking a polynomial-based cryptosystem: Polly Cracker. 143-148 - Yukio Itakura, Masaki Hashiyada, Toshio Nagashima, Shigeo Tsujii:
Proposal on personal identifiers generated from the STR information of DNA. 149-160 - Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson:
Key recovery for the commercial environment. 161-174 - Sangjin Kim, Heekuck Oh:
A new electronic check system with reusable refunds. 175-188 - Ed Dawson, Kapali Viswanathan, Colin Boyd:
Compliant cryptologic protocols. 189-202
Volume 1, Number 4, July 2003
- Valery I. Korzhik, Guillermo Morales-Luna:
Hybrid authentication based on noisy channels. 203-210 - Chun Ruan, Vijay Varadharajan:
A formal graph based framework for supporting authorization delegations and conflict resolutions. 211-222 - Steve Kremer, Olivier Markowitch:
Fair multi-party non-repudiation protocols. 223-235 - Barbara Carminati, Elena Ferrari:
Management of access control policies for XML document sources. 236-260
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.