default search action
International Journal of Information Security, Volume 19
Volume 19, Number 1, February 2020
- Takeshi Takahashi, Rodrigo Roman Castro, Bilhanan Silverajan, Ryan K. L. Ko, Said Tabet:
Message from the guest editors. 1-2 - Peter Aufner:
The IoT security gap: a look down into the valley between threat models and their implementation. 3-14 - Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe:
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). 15-38 - Raz Ben Yehuda, Nezer Jacob Zaidenberg:
Protection against reverse engineering in ARM. 39-51 - Ili Ko, Desmond Chambers, Enda Barrett:
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain. 53-70 - Hayate Takase, Ryotaro Kobayashi, Masahiko Kato, Ren Ohmura:
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. 71-81 - Seiichi Ozawa, Tao Ban, Naoki Hashimoto, Junji Nakazato, Jumpei Shimamura:
A study of IoT malware activities using association rule learning for darknet sensor data. 83-92 - Behshid Shayesteh, Vesal Hakami, Ahmad Akbari:
A trust management scheme for IoT-enabled environmental health/accessibility monitoring services. 93-110 - Davide Ferraris, M. Carmen Fernández Gago:
TrUStAPIS: a trust requirements elicitation method for IoT. 111-127 - K. Sowjanya, Mou Dasgupta, Sangram Ray:
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. 129-146
Volume 19, Number 2, April 2020
- Rajendra Patil, Harsha Dudeja, Chirag Modi:
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. 147-162 - Ben Attia Hasiba, Laïd Kahloul, Saber Benhazrallah, Samir Bourekkache:
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies. 163-187 - Sridhar Adepu, Nandha Kumar Kandasamy, Jianying Zhou, Aditya Mathur:
Attacks on smart grid: power supply interruption and malicious power generation. 189-211 - Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, Jeff Yan:
SonarSnoop: active acoustic side-channel attacks. 213-228 - Sanjeet Kumar Nayak, Somanath Tripathy:
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage. 229-240 - Ben Attia Hasiba, Laïd Kahloul, Saber Benharzallah, Samir Bourekkache:
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies. 241
Volume 19, Number 3, June 2020
- Kuo-Hui Yeh, Chunhua Su, Robert H. Deng, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. 243-244 - Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks. 245-255 - Alexander Yohan, Nai-Wei Lo:
FOTB: a secure blockchain-based firmware update framework for IoT environment. 257-278 - Weizhi Meng, Wenjuan Li, Laurence T. Yang, Peng Li:
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. 279-290 - Or Sattath:
On the insecurity of quantum Bitcoin mining. 291-302 - Yuanjian Zhou, Yining Liu, Chengshun Jiang, Shulan Wang:
An improved FOO voting scheme using blockchain. 303-310 - Zijian Bao, Wenbo Shi, Saru Kumari, Zhiyin Kong, Chien-Ming Chen:
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. 311-321 - Shufan Zhang, Lili Wang, Hu Xiong:
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability. 323-341
Volume 19, Number 4, August 2020
- Marco Tiloca, Gianluca Dini, Kiki Rizki, Shahid Raza:
Group rekeying based on member join history. 343-381 - Minhye Seo, Suhri Kim, Dong Hoon Lee, Jong Hwan Park:
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method. 383-399 - Michael Hölzl, Michael Roland, Omid Mir, René Mayrhofer:
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation. 401-417 - Wakaha Ogata, Takaaki Otemori:
Security analysis of secure kNN and ranked keyword search over encrypted data. 419-425 - Matthias Pilz, Fariborz Baghaei Naeini, Ketil Grammont, Coline Smagghe, Mastaneh Davis, Jean-Christophe Nebel, Luluwah Al-Fagih, Eckhard Pfluegel:
Security attacks on smart grid scheduling and their defences: a game-theoretic approach. 427-443 - Itaru Ueda, Daiki Miyahara, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Secure implementations of a random bisection cut. 445-452 - Chun-Hui Wu, Xiaofeng Chen, Willy Susilo:
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets. 453-464 - Jordi Casas-Roma:
DUEF-GA: data utility and privacy evaluation framework for graph anonymization. 465-478 - Dimitris Mitropoulos, Thodoris Sotiropoulos, Nikos Koutsovasilis, Diomidis Spinellis:
PDGuard: an architecture for the control and secure processing of personal data. 479-498
Volume 19, Number 5, October 2020
- Mina Sheikhalishahi, Andrea Saracino, Fabio Martinelli, Antonio La Marra, Mohammed Mejri, Nadia Tawbi:
Digital Waste Disposal: an automated framework for analysis of spam emails. 499-522 - Areej Alzaidi, Suhair Alshehri, Seyed M. Buhari:
DroidRista: a highly precise static data flow analysis framework for android applications. 523-536 - Vicenç Torra:
Random dictatorship for privacy-preserving social choice. 537-545 - Riccardo Bernardini, Roberto Rinaldo:
Analysis of some simple stabilizers for physically obfuscated keys. 547-565 - Huy-Trung Nguyen, Quoc-Dung Ngo, Van-Hoang Le:
A novel graph-based approach for IoT botnet detection. 567-577 - Ahmed M. Manasrah, Areej R. AL-Rabadi, Najib A. Kofahi:
Key pre-distribution approach using block LU decomposition in wireless sensor network. 579-596 - Sona Taheri, Adil M. Bagirov, Iqbal Gondal, Simon Brown:
Cyberattack triage using incremental clustering for intrusion detection systems. 597-607
Volume 19, Number 6, December 2020
- Britta Hale:
User-mediated authentication protocols and unforgeability in key collision. 609-621 - Pablo Picazo-Sanchez, Juan Tapiador, Gerardo Schneider:
After you, please: browser extensions order attacks and countermeasures. 623-638 - Yanting Zhang, Jianwei Liu, Zongyang Zhang, Weiran Liu:
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices. 639-656 - Kamalakanta Sethi, E. Sai Rupesh, Rahul Kumar, Padmalochan Bera, Venu Madhav Yatam:
A context-aware robust intrusion detection system: a reinforcement learning-based approach. 657-678 - Reem Melki, Hassan N. Noura, Ali Chehab:
Lightweight multi-factor mutual authentication protocol for IoT devices. 679-694 - Tina Tavizi, Mehdi Shajari:
A language and a pattern system for temporal property specification: advanced metering infrastructure case study. 695-710 - Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen:
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. 711-720
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.