default search action
International Journal of Information Security, Volume 12
Volume 12, Number 1, February 2013
- Paolo D'Arco, Angel L. Pérez del Pozo:
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage. 1-17 - Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo:
Double-trapdoor anonymous tags for traceable signatures. 19-31 - Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:
Fully non-interactive onion routing with forward secrecy. 33-47 - Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private discovery of common social contacts. 49-65
Volume 12, Number 2, April 2013
- Félix Gómez Mármol, Christoph Sorge, Ronald Petrlic, Osman Ugus, Dirk Westhoff, Gregorio Martínez Pérez:
Privacy-enhanced architecture for smart metering. 67-82 - Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the convex hull click human identification protocol. 83-96 - Mansour Alsaleh, Paul C. van Oorschot:
Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors. 97-110 - Imad M. Abbadi:
A framework for establishing trust in Cloud provenance. 111-128 - David Rebollo-Monedero, Javier Parra-Arnau, Claudia Díaz, Jordi Forné:
On the measurement of privacy as an attacker's estimation error. 129-149 - Panagiotis Rizomiliotis, Stefanos Gritzalis:
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem. 151-154
Volume 12, Number 3, June 2013
- Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn:
Visualization-based policy analysis for SELinux: framework and user study. 155-171 - Ginés Dólera Tormo, Gabriel López Millán, Gregorio Martínez Pérez:
Definition of an advanced identity management infrastructure. 173-200 - Nikos Vrakas, Costas Lambrinoudakis:
An intrusion detection and prevention system for IMS and VoIP services. 201-217 - David Bernhard, Georg Fuchsbauer, Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi:
Anonymous attestation with user-controlled linkability. 219-249
Volume 12, Number 4, August 2013
- Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. 251-265 - Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:
Less is more: relaxed yet composable security notions for key exchange. 267-297 - Gerard Draper-Gil, Jianying Zhou, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos:
An optimistic fair exchange protocol with active intermediaries. 299-318 - Danièle Beauquier, Joëlle Cohen, Ruggero Lanotte:
Security policies enforcement using finite and pushdown edit automata. 319-336 - Kun Peng:
A shuffle to achieve high efficiency through pre-computation and batch verification. 337-345
Volume 12, Number 5, October 2013
- Daniel Boteanu, José M. Fernandez:
A comprehensive study of queue management as a DoS counter-measure. 347-382 - Pu Wang, Marta C. González, Ronaldo Menezes, Albert-László Barabási:
Understanding the spread of malicious mobile-phone programs and their damage potential. 383-392 - Z. Cliffe Schreuders, Christian Payne, Tanya Jane McGill:
The functionality-based application confinement model. 393-422 - Hessam Zakerzadeh, Sylvia L. Osborn:
Delay-sensitive approaches for anonymizing numerical streaming data. 423-437
Volume 12, Number 6, November 2013
- Emmanuel Bresson, Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results. 439-465 - Ashish Kundu, Elisa Bertino:
Privacy-preserving authentication of trees and graphs. 467-494 - Yu-Shian Chen, Chin-Laung Lei:
Aggregate message authentication codes (AMACs) with on-the-fly verification. 495-504 - Fernando Pereñíguez-Garcia, Rafael Marín López, Georgios Kambourakis, Antonio Ruiz-Martínez, Stefanos Gritzalis, Antonio Fernandez Gómez-Skarmeta:
KAMU: providing advanced user privacy in Kerberos multi-domain scenarios. 505-525
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.