


default search action
International Journal of Information Security, Volume 19
Volume 19, Number 1, February 2020
- Takeshi Takahashi, Rodrigo Roman Castro, Bilhanan Silverajan, Ryan K. L. Ko
, Said Tabet:
Message from the guest editors. 1-2 - Peter Aufner
:
The IoT security gap: a look down into the valley between threat models and their implementation. 3-14 - Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe
:
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). 15-38 - Raz Ben Yehuda, Nezer Jacob Zaidenberg
:
Protection against reverse engineering in ARM. 39-51 - Ili Ko
, Desmond Chambers, Enda Barrett:
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain. 53-70 - Hayate Takase
, Ryotaro Kobayashi, Masahiko Kato, Ren Ohmura:
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. 71-81 - Seiichi Ozawa
, Tao Ban, Naoki Hashimoto, Junji Nakazato, Jumpei Shimamura:
A study of IoT malware activities using association rule learning for darknet sensor data. 83-92 - Behshid Shayesteh, Vesal Hakami
, Ahmad Akbari
:
A trust management scheme for IoT-enabled environmental health/accessibility monitoring services. 93-110 - Davide Ferraris
, M. Carmen Fernández Gago:
TrUStAPIS: a trust requirements elicitation method for IoT. 111-127 - K. Sowjanya
, Mou Dasgupta
, Sangram Ray
:
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. 129-146
Volume 19, Number 2, April 2020
- Rajendra Patil
, Harsha Dudeja, Chirag Modi
:
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. 147-162 - Ben Attia Hasiba, Laïd Kahloul
, Saber Benhazrallah, Samir Bourekkache
:
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies. 163-187 - Sridhar Adepu
, Nandha Kumar Kandasamy, Jianying Zhou
, Aditya Mathur:
Attacks on smart grid: power supply interruption and malicious power generation. 189-211 - Peng Cheng, Ibrahim Ethem Bagci
, Utz Roedig
, Jeff Yan:
SonarSnoop: active acoustic side-channel attacks. 213-228 - Sanjeet Kumar Nayak
, Somanath Tripathy
:
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage. 229-240 - Ben Attia Hasiba, Laïd Kahloul
, Saber Benharzallah, Samir Bourekkache
:
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies. 241
Volume 19, Number 3, June 2020
- Kuo-Hui Yeh, Chunhua Su, Robert H. Deng
, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. 243-244 - Chun-I Fan
, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks. 245-255 - Alexander Yohan
, Nai-Wei Lo
:
FOTB: a secure blockchain-based firmware update framework for IoT environment. 257-278 - Weizhi Meng
, Wenjuan Li
, Laurence T. Yang, Peng Li:
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. 279-290 - Or Sattath
:
On the insecurity of quantum Bitcoin mining. 291-302 - Yuanjian Zhou, Yining Liu
, Chengshun Jiang, Shulan Wang:
An improved FOO voting scheme using blockchain. 303-310 - Zijian Bao, Wenbo Shi, Saru Kumari
, Zhiyin Kong, Chien-Ming Chen
:
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. 311-321 - Shufan Zhang
, Lili Wang, Hu Xiong:
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability. 323-341
Volume 19, Number 4, August 2020
- Marco Tiloca, Gianluca Dini
, Kiki Rizki, Shahid Raza:
Group rekeying based on member join history. 343-381 - Minhye Seo, Suhri Kim, Dong Hoon Lee, Jong Hwan Park:
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method. 383-399 - Michael Hölzl
, Michael Roland
, Omid Mir, René Mayrhofer
:
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation. 401-417 - Wakaha Ogata
, Takaaki Otemori:
Security analysis of secure kNN and ranked keyword search over encrypted data. 419-425 - Matthias Pilz
, Fariborz Baghaei Naeini
, Ketil Grammont, Coline Smagghe, Mastaneh Davis
, Jean-Christophe Nebel
, Luluwah Al-Fagih
, Eckhard Pfluegel
:
Security attacks on smart grid scheduling and their defences: a game-theoretic approach. 427-443 - Itaru Ueda, Daiki Miyahara
, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki
, Hideaki Sone:
Secure implementations of a random bisection cut. 445-452 - Chun-Hui Wu, Xiaofeng Chen, Willy Susilo
:
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets. 453-464 - Jordi Casas-Roma
:
DUEF-GA: data utility and privacy evaluation framework for graph anonymization. 465-478 - Dimitris Mitropoulos
, Thodoris Sotiropoulos, Nikos Koutsovasilis, Diomidis Spinellis
:
PDGuard: an architecture for the control and secure processing of personal data. 479-498
Volume 19, Number 5, October 2020
- Mina Sheikhalishahi, Andrea Saracino
, Fabio Martinelli, Antonio La Marra, Mohammed Mejri, Nadia Tawbi
:
Digital Waste Disposal: an automated framework for analysis of spam emails. 499-522 - Areej Alzaidi, Suhair Alshehri
, Seyed M. Buhari:
DroidRista: a highly precise static data flow analysis framework for android applications. 523-536 - Vicenç Torra
:
Random dictatorship for privacy-preserving social choice. 537-545 - Riccardo Bernardini
, Roberto Rinaldo:
Analysis of some simple stabilizers for physically obfuscated keys. 547-565 - Huy-Trung Nguyen
, Quoc-Dung Ngo, Van-Hoang Le
:
A novel graph-based approach for IoT botnet detection. 567-577 - Ahmed M. Manasrah, Areej R. AL-Rabadi, Najib A. Kofahi:
Key pre-distribution approach using block LU decomposition in wireless sensor network. 579-596 - Sona Taheri
, Adil M. Bagirov, Iqbal Gondal
, Simon Brown:
Cyberattack triage using incremental clustering for intrusion detection systems. 597-607
Volume 19, Number 6, December 2020
- Britta Hale
:
User-mediated authentication protocols and unforgeability in key collision. 609-621 - Pablo Picazo-Sanchez
, Juan Tapiador
, Gerardo Schneider:
After you, please: browser extensions order attacks and countermeasures. 623-638 - Yanting Zhang
, Jianwei Liu
, Zongyang Zhang
, Weiran Liu:
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices. 639-656 - Kamalakanta Sethi, E. Sai Rupesh, Rahul Kumar, Padmalochan Bera, Venu Madhav Yatam:
A context-aware robust intrusion detection system: a reinforcement learning-based approach. 657-678 - Reem Melki
, Hassan N. Noura
, Ali Chehab
:
Lightweight multi-factor mutual authentication protocol for IoT devices. 679-694 - Tina Tavizi, Mehdi Shajari:
A language and a pattern system for temporal property specification: advanced metering infrastructure case study. 695-710 - Lixue Sun
, Chunxiang Xu, Yuan Zhang, Kefei Chen:
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. 711-720

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.