default search action
International Journal of Information Security, Volume 10
Volume 10, Number 1, February 2011
- Alex Baumgarten, Michael Steffen, Matthew Clausman, Joseph Zambreno:
A case study in hardware Trojan design and implementation. 1-14 - Hoon Wei Lim, Kenneth G. Paterson:
Identity-based cryptography for grid security. 15-32 - Kun Peng, Ed Dawson, Feng Bao:
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. 33-47 - Kun Peng:
A general and efficient countermeasure to relation attacks in mix-based e-voting. 49-60
Volume 10, Number 2, June 2011
- George Coker, Joshua D. Guttman, Peter A. Loscocco, Amy L. Herzog, Jonathan K. Millen, Brian O'Hanlon, John D. Ramsdell, Ariel Segall, Justin Sheehy, Brian T. Sniffen:
Principles of remote attestation. 63-81 - Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky:
Probabilistic timing covert channels: to close or not to close? 83-106 - Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically sound security proofs for basic and public-key Kerberos. 107-134
Volume 10, Number 3, June 2011
- Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, Geraint Price:
User-friendly and certificate-free grid security infrastructure. 137-153 - Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao:
Secure localization with attack detection in wireless sensor networks. 155-171 - Peter Roelse:
Dynamic subtree tracing and its application in pay-TV systems. 173-187 - Aniket Kate, Ian Goldberg:
Generalizing cryptosystems based on the subset sum problem. 189-199
Volume 10, Number 4, August 2011
- Berkant Ustaoglu:
Integrating identity-based and certificate-based authenticated key exchange protocols. 201-212 - Nitesh Saxena, Jonathan Voris:
Data remanence effects on memory-based entropy collection for RFID systems. 213-222 - Yacine Bouzida, Luigi Logrippo, Serge Mankovski:
Concrete- and abstract-based access control. 223-238 - Nataliia Bielova, Fabio Massacci:
Do you really mean what you actually enforced? - Edited automata revisited. 239-254 - Neil Hanley, Michael Tunstall, William P. Marnane:
Using templates to distinguish multiplications from squaring operations. 255-266
Volume 10, Number 5, October 2011
- Sushil Jajodia, Jianying Zhou:
Message from the Guest Editors. 267-268 - Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: semantics aware signature generation for polymorphic worm detection. 269-283 - Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing host security using external environment sensors. 285-299 - Luciana Marconi, Mauro Conti, Roberto Di Pietro:
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection. 301-319
Volume 10, Number 6, November 2011
- John Charles Gyorffy, Andrew F. Tappenden, James Miller:
Token-based graphical password authentication. 321-336 - William Bradley Glisson, Tim Storer, Gavin Mayall, Iain Moug, George Grispos:
Electronic retention: what does your mobile phone reveal about you? 337-349 - Sergio Sánchez García, Ana Gómez Oliva, Emilia Pérez Belleboni, Iván Pau de la Cruz:
Solving identity delegation problem in the e-government environment. 351-372 - Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. 373-385 - Josep M. Miret, Francesc Sebé:
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks. 387-389 - Peter Roelse:
Erratum to: Dynamic subtree tracing and its application in pay-TV systems. 391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.