default search action
International Journal of Information Security, Volume 9
Volume 9, Number 1, February 2010
- Ruijuan Zheng, Mingchuan Zhang, Qingtao Wu, Shibao Sun, Jiexin Pu:
Analysis and application of Bio-Inspired Multi-Net Security Model. 1-17 - Shuihua Han, Chao-Hsien Chu:
Content-based image authentication: current status, issues, and challenges. 19-32 - David M. Goldschlag, Stuart G. Stubblebine, Paul F. Syverson:
Temporarily hidden bit commitment and lottery applications. 33-50 - Anindya Chakraborty, Arun K. Majumdar, Shamik Sural:
A column dependency-based approach for static and dynamic recovery of databases from malicious transactions. 51-67 - Duncan Bayly, Maurice Castro, Arathi Arakala, Jason Jeffers, Kathy J. Horadam:
Fractional biometrics: safeguarding privacy in biometric applications. 69-82
Volume 9, Number 2, April 2010
- Giampaolo Bella:
The principle of guarantee availability for security protocol analysis. 83-97 - João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
Formal validation of automated policy refinement in the management of network security systems. 99-125 - Lars R. Knudsen, Charlotte V. Miolane:
Counting equations in algebraic attacks on block ciphers. 127-135 - Praveen Gauravaram, John Kelsey, Lars R. Knudsen, Søren S. Thomsen:
On hash functions using checksums. 137-151
Volume 9, Number 3, June 2010
- Ching Lin, Vijay Varadharajan:
MobileTrust: a trust enhanced security architecture for mobile agent systems. 153-178 - Amlan Kundu, Shamik Sural, Arun K. Majumdar:
Database intrusion detection using sequence alignment. 179-191 - Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding renewable cryptographic keys into noisy data. 193-208 - Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
A delegation model for extended RBAC. 209-236
Volume 9, Number 4, August 2010
- Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong Wang:
A new hardware-assisted PIR with O(n) shuffle cost. 237-252 - Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: a comprehensive environment for the analysis of access control policies. 253-273 - Alwyn Roshan Pais, Shankar Joshi:
A new probabilistic rekeying method for secure multicast groups. 275-286 - Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient online/offline identity-based signature for wireless sensor network. 287-296 - Tsz Hon Yuen, Willy Susilo, Yi Mu:
How to construct identity-based signatures without the key escrow problem. 297-311
Volume 9, Number 5, October 2010
- Benoît Dupasquier, Stefan Burschka, Kieran McLaughlin, Sakir Sezer:
Analysis of information leakage from encrypted Skype conversations. 313-325 - Boris Skoric, Marc X. Makkes:
Flowchart description of security primitives for controlled physical unclonable functions. 327-335 - Hedieh Sajedi, Mansour Jamzad:
Using contourlet transform and cover selection for secure steganography. 337-352 - Haiyong Chen, Hailiang Chen:
A hybrid scheme for securing fingerprint templates. 353-361 - Yoo-Jin Baek:
Regular 2w-ary right-to-left exponentiation algorithm with very efficient DPA and FA countermeasures. 363-370
Volume 9, Number 6, December 2010
- Ivan Damgård, Mads Jurik, Jesper Buus Nielsen:
A generalization of Paillier's public-key system with applications to electronic voting. 371-385 - Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan:
Password-authenticated key exchange based on RSA. 387-410 - Moni Naor, Benny Pinkas:
Efficient trace and revoke schemes. 411-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.