


default search action
International Journal of Information Security, Volume 15
Volume 15, Number 1, February 2016
- Liang Liu, Xiaofeng Chen, Wenjing Lou:
Secure three-party computational protocols for triangle area. 1-13 - Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more. 15-33 - Weiran Liu, Jianwei Liu
, Qianhong Wu, Bo Qin, Yan Li:
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption. 35-50 - Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nicolas T. Courtois:
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations. 51-65 - Yuyu Wang, Keisuke Tanaka:
Strongly simulation-extractable leakage-resilient NIZK. 67-79 - Y. Sreenivasa Rao
, Ratna Dutta:
Efficient attribute-based signature and signcryption realizing expressive access structures. 81-109
Volume 15, Number 2, April 2016
- Ronald De Keulenaer, Jonas Maebe, Koen De Bosschere, Bjorn De Sutter:
Link-time smart card code hardening. 111-130 - Randa Jabeur Ben Chikha
, Tarek Abbes, Wassim Ben Chikha
, Adel Bouhoula:
Behavior-based approach to detect spam over IP telephony attacks. 131-143 - Vahid R. Karimi, Paulo S. C. Alencar, Donald D. Cowan:
A uniform approach for access control and business models with explicit rule realization. 145-171 - Elie Raad, Bechara al Bouna, Richard Chbeir
:
Preventing sensitive relationships disclosure for better social media preservation. 173-194 - Alberto Huertas Celdrán
, Ginés Dólera Tormo, Félix Gómez Mármol
, Manuel Gil Pérez
, Gregorio Martínez Pérez:
Resolving privacy-preserving relationships over outsourced encrypted data storages. 195-209 - Víctor Mateu
, Josep M. Miret, Francesc Sebé
:
A hybrid approach to vector-based homomorphic tallying remote voting. 211-221 - Guomin Yang
, Willy Susilo
, Yi Mu:
Message from the Guest Editors. 223-224
Volume 15, Number 3, June 2016
- Hatem A. Rashwan
, Agusti Solanas
, Domenec Puig, Antoni Martínez-Ballesté
:
Understanding trust in privacy-aware video surveillance systems. 225-234 - Tytus Kurek
, Marcin Niemiec
, Artur Lason:
Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality. 235-250 - Cengiz Örencik, Ayse Selcuk, Erkay Savas, Murat Kantarcioglu:
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation. 251-269 - Clémentine Gritti, Willy Susilo
, Thomas Plantard
, Kaitai Liang
, Duncan S. Wong:
Broadcast encryption with dealership. 271-283 - Bart Mennink, Bart Preneel
:
Efficient parallelizable hashing using small non-compressing primitives. 285-300 - Tarek Abbes
, Adel Bouhoula, Michaël Rusinowitch:
Detection of firewall configuration errors with updatable tree. 301-317 - P. Salini, S. Kanmani:
Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems. 319-334
Volume 15, Number 4, August 2016
- Leyli Javid Khayati, Cengiz Örencik, Erkay Savas, Berkant Ustaoglu
:
A practical privacy-preserving targeted advertising scheme for IPTV users. 335-360 - Qiguang Miao
, Jiachen Liu, Ying Cao, Jianfeng Song:
Malware detection using bilayer behavior abstraction and improved one-class support vector machines. 361-379 - Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone
:
Flow-based reputation with uncertainty: evidence-based subjective logic. 381-402 - István Vajda:
On the analysis of time-aware protocols in universal composability framework. 403-412 - Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez
, Debrup Chakraborty
:
A cryptographic study of tokenization systems. 413-432 - Avleen Kaur Malhi, Shalini Batra:
Privacy-preserving authentication framework using bloom filter for secure vehicular communications. 433-453
Volume 15, Number 5, October 2016
- Marios Anagnostopoulos
, Georgios Kambourakis, Stefanos Gritzalis
:
New facets of mobile botnet: architecture and evaluation. 455-473 - Abdullah Almaatouq, Erez Shmueli, Mariam Nouh
, Ahmad Alabdulkareem, Vivek K. Singh, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex 'Sandy' Pentland:
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. 475-491 - Marina Blanton
, Everaldo Aguiar:
Private and oblivious set and multiset operations. 493-518 - Mehmet Sabir Kiraz
, Osmanbey Uzunkol:
Efficient and verifiable algorithms for secure outsourcing of cryptographic computations. 519-537 - Changhui Hu, Lidong Han:
Efficient wildcard search over encrypted data. 539-547 - Kohei Kasamatsu, Takahiro Matsuda
, Keita Emura
, Nuttapong Attrapadung
, Goichiro Hanaoka
, Hideki Imai:
Time-specific encryption from forward-secure encryption: generic and direct constructions. 549-571
Volume 15, Number 6, November 2016
- Liqun Chen
, Chris J. Mitchell
:
Message from the guest editors. 573-574 - Paul D. Rowe, Joshua D. Guttman
, Moses D. Liskov:
Measuring protocol strength with security goals. 575-596 - Mark Manulis
, Douglas Stebila
, Franziskus Kiefer, Nick Denham:
Secure modular password authentication for the web using channel bindings. 597-620 - Christopher W. Brown, Michael Jenkins:
Analyzing proposals for improving authentication on the TLS-/SSL-protected Web. 621-635 - Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol. 637-657 - Cas Cremers, Marko Horvat:
Improving the ISO/IEC 11770 standard for key management techniques. 659-673

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.