Hydras and IPFS: a decentralised playground for malware
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00443-0
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00464-9
SonarSnoop: active acoustic side-channel attacks
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00449-8
A novel graph-based approach for IoT botnet detection
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00475-6
A study of IoT malware activities using association rule learning for darknet sensor data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00439-w
Secure implementations of a random bisection cut
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00463-w
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00437-y
Encouraging users to improve password security and memorability
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00429-y
Provably secure public-key encryption with conjunctive and subset keyword search
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-018-00426-7
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00434-1
The IoT security gap: a look down into the valley between threat models and their implementation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00445-y
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00465-8
An improved FOO voting scheme using blockchain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00457-8
Signature schemes with a fuzzy private key
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00428-z
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00456-9
Lightweight multi-factor mutual authentication protocol for IoT devices
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00484-5
Protection against reverse engineering in ARM
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00450-1
DroidRista: a highly precise static data flow analysis framework for android applications
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00471-w
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00430-5
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00462-x
Attacks on smart grid: power supply interruption and malicious power generation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00452-z
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00453-y
Security attacks on smart grid scheduling and their defences: a game-theoretic approach
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00460-z
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00436-z
FOTB: a secure blockchain-based firmware update framework for IoT environment
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00467-6
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00448-9
Repairing an aggregation-based smart metering system
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00435-0
Random dictatorship for privacy-preserving social choice
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00474-7
DUEF-GA: data utility and privacy evaluation framework for graph anonymization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00469-4
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00441-2
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00459-6
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00476-5
Analysis of some simple stabilizers for physically obfuscated keys
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00473-8
Message from the guest editors
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00472-9
Security analysis of secure kNN and ranked keyword search over encrypted data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00461-y
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00458-7
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00432-3
PDGuard: an architecture for the control and secure processing of personal data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00468-5
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00466-7
Cyberattack triage using incremental clustering for intrusion detection systems
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00478-3
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00455-w
File Guard: automatic format-based media file sanitization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00440-3
Group rekeying based on member join history
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00451-0
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00454-x
User-mediated authentication protocols and unforgeability in key collision
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00479-2
Key pre-distribution approach using block LU decomposition in wireless sensor network
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00477-4
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00480-9
Secure and trusted partial grey-box verification
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00431-4
Digital Waste Disposal: an automated framework for analysis of spam emails
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00470-x
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00447-w