


default search action
International Journal of Information Security, Volume 17
Volume 17, Number 1, February 2018
- Alfredo Rial, George Danezis
, Markulf Kohlweiss
:
Privacy-preserving smart metering revisited. 1-31 - Hua Deng
, Yunya Zhou, Qianhong Wu, Bo Qin, Jianwei Liu:
Secure pay-TV for chained hotels. 33-42 - Kazuki Yoneyama:
Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs. 43-66 - Riccardo Bernardini
, Roberto Rinaldo:
Generalized Elias schemes for efficient harvesting of truly random bits. 67-81 - Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens, Frédéric Cuppens:
Achieving dynamicity in security policies enforcement using aspects. 83-103 - G. Deepa
, P. Santhi Thilagam
, Furqan Ahmed Khan, Amit Praseed
, Alwyn R. Pais
, Nushafreen Palsetia:
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications. 105-120
Volume 17, Number 2, April 2018
- Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. 121-134 - Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi:
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle. 135-151 - G. Kirubavathi Venkatesh
, R. Anitha:
Structural analysis and detection of android botnets using machine learning techniques. 153-167 - Aviv Gruber, Irad Ben-Gal:
Using targeted Bayesian network learning for suspect identification in communication networks. 169-181 - Tsung-Min Kuo
, Sung-Ming Yen, Meng-Che Han:
Dynamic reversed accumulator. 183-191 - Jae Hong Seo, Keita Emura
, Keita Xagawa
, Kazuki Yoneyama:
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures. 193-220 - Aron Laszka
, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
A game-theoretic approach for integrity assurance in resource-bounded systems. 221-242
Volume 17, Number 3, June 2018
- Josep Domingo-Ferrer
, Alberto Blanco-Justicia
, Carla Ràfols
:
Dynamic group size accreditation and group discounts preserving anonymity. 243-260 - Ying Luo, Sen-Ching S. Cheung
, Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni:
Anonymous subject identification and privacy information management in video surveillance. 261-278 - Antoni Martínez-Ballesté, Hatem A. Rashwan
, Domenec Puig, Agusti Solanas
:
Design and implementation of a secure and trustworthy platform for privacy-aware video surveillance. 279-290 - Maryam Mehrnezhad
, Ehsan Toreini, Siamak F. Shahandashti
, Feng Hao
:
Stealing PINs via mobile sensors: actual risk versus user perception. 291-313 - Sangita Roy
, Ashok Singh Sairam
:
Distributed star coloring of network for IP traceback. 315-326 - Sebastian Faust, Carmit Hazay, Daniele Venturi
:
Outsourced pattern matching. 327-346 - Yujue Wang, HweeHwa Pang
, Robert H. Deng
:
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management. 347-363
Volume 17, Number 4, August 2018
- Francisco Javier González-Serrano
, Adrian Amor-Martin
, Jorge Casamayon-Anton:
Supervised machine learning using encrypted training data. 365-377 - HyoungMin Ham, JongHyup Lee, JooSeok Song:
Improved yoking proof protocols for preserving anonymity. 379-393 - Jean-Louis Lanet, Hélène Le Bouder, Mohammed Benattou
, Axel Legay:
When time meets test. 395-409 - Syed Taha Ali
, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao
:
ZombieCoin 2.0: managing next-generation botnets using Bitcoin. 411-422 - Zheng Yang
, Chao Liu, Wanping Liu, Daigu Zhang, Song Luo:
A new strong security model for stateful authenticated group key exchange. 423-440 - Miguel Morales-Sandoval
, José Luis González
, Arturo Diaz-Perez, Víctor Jesús Sosa Sosa
:
A pairing-based cryptographic approach for data security in the cloud. 441-461 - Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts. 463-475 - Hongyong Jia, Yue Chen, Julong Lan, Kaixiang Huang, Jun Wang:
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators. 477-490
Volume 17, Number 5, October 2018
- Liqun Chen
, Jinguang Han
, Chris J. Mitchell:
Message from the Guest Editors. 491-492 - Kazuya Imamura
, Kazuhiko Minematsu, Tetsu Iwata
:
Integrity analysis of authenticated encryption based on stream ciphers. 493-511 - Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto:
Multi-cast key distribution: scalable, dynamic and provably secure construction. 513-532 - Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes. 533-548 - Yuxi Li, Fucai Zhou, Yuhai Qin, Muqing Lin, Zifeng Xu:
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage. 549-568
- Carlos Ribeiro, Herbert Leitold, Simon Esposito, David Mitzam:
STORK: a real, heterogeneous, large-scale eID management system. 569-585 - Franco Frattolillo
:
Watermarking protocols: an excursus to motivate a new approach. 587-601 - Lanfranco Lopriore:
Access right management by extended password capabilities. 603-612
Volume 17, Number 6, November 2018
- Ehab ElSalamouny
, Sébastien Gambs:
Optimal noise functions for location privacy on continuous regions. 613-630 - Keisuke Murakami, Takeaki Uno:
Optimization algorithm for k-anonymization of datasets with low information loss. 631-644 - Nolen Scaife
, Henry Carter
, Lyrissa Lidsky
, Rachael L. Jones, Patrick Traynor:
OnionDNS: a seizure-resistant top-level domain. 645-660 - Daiki Chiba
, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori
, Shigeki Goto:
DomainProfiler: toward accurate and early discovery of domain names abused in future. 661-680 - Gaute Wangen, Christoffer Hallstensen, Einar Snekkenes:
A framework for estimating information security risk assessment method completeness - Core Unified Risk Framework, CURF. 681-699 - Nina Bindel
, Johannes Buchmann, Susanne Rieß:
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols. 701-718 - Aniello Cimitile, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio:
Talos: no more ransomware victims with formal methods. 719-738

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.