


default search action
International Journal of Information Security, Volume 12
Volume 12, Number 1, February 2013
- Paolo D'Arco, Angel L. Pérez del Pozo:

Toward tracing and revoking schemes secure against collusion and any form of secret information leakage. 1-17 - Masayuki Abe, Sherman S. M. Chow

, Kristiyan Haralambiev, Miyako Ohkubo:
Double-trapdoor anonymous tags for traceable signatures. 19-31 - Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:

Fully non-interactive onion routing with forward secrecy. 33-47 - Emiliano De Cristofaro, Mark Manulis

, Bertram Poettering:
Private discovery of common social contacts. 49-65
Volume 12, Number 2, April 2013
- Félix Gómez Mármol

, Christoph Sorge, Ronald Petrlic, Osman Ugus, Dirk Westhoff, Gregorio Martínez Pérez
:
Privacy-enhanced architecture for smart metering. 67-82 - Hassan Jameel Asghar

, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the convex hull click human identification protocol. 83-96 - Mansour Alsaleh, Paul C. van Oorschot

:
Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors. 97-110 - Imad M. Abbadi:

A framework for establishing trust in Cloud provenance. 111-128 - David Rebollo-Monedero

, Javier Parra-Arnau, Claudia Díaz, Jordi Forné
:
On the measurement of privacy as an attacker's estimation error. 129-149 - Panagiotis Rizomiliotis, Stefanos Gritzalis

:
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem. 151-154
Volume 12, Number 3, June 2013
- Wenjuan Xu, Mohamed Shehab

, Gail-Joon Ahn
:
Visualization-based policy analysis for SELinux: framework and user study. 155-171 - Ginés Dólera Tormo, Gabriel López Millán, Gregorio Martínez Pérez

:
Definition of an advanced identity management infrastructure. 173-200 - Nikos Vrakas, Costas Lambrinoudakis

:
An intrusion detection and prevention system for IMS and VoIP services. 201-217 - David Bernhard, Georg Fuchsbauer, Essam Ghadafi

, Nigel P. Smart, Bogdan Warinschi:
Anonymous attestation with user-controlled linkability. 219-249
Volume 12, Number 4, August 2013
- Duong Hieu Phan

, David Pointcheval
, Siamak Fayyaz Shahandashti
, Mario Strefler:
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. 251-265 - Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:

Less is more: relaxed yet composable security notions for key exchange. 267-297 - Gerard Draper-Gil, Jianying Zhou

, Josep Lluís Ferrer-Gomila
, M. Francisca Hinarejos
:
An optimistic fair exchange protocol with active intermediaries. 299-318 - Danièle Beauquier, Joëlle Cohen, Ruggero Lanotte

:
Security policies enforcement using finite and pushdown edit automata. 319-336 - Kun Peng:

A shuffle to achieve high efficiency through pre-computation and batch verification. 337-345
Volume 12, Number 5, October 2013
- Daniel Boteanu, José M. Fernandez

:
A comprehensive study of queue management as a DoS counter-measure. 347-382 - Pu Wang, Marta C. González, Ronaldo Menezes

, Albert-László Barabási:
Understanding the spread of malicious mobile-phone programs and their damage potential. 383-392 - Z. Cliffe Schreuders, Christian Payne, Tanya Jane McGill

:
The functionality-based application confinement model. 393-422 - Hessam Zakerzadeh, Sylvia L. Osborn:

Delay-sensitive approaches for anonymizing numerical streaming data. 423-437
Volume 12, Number 6, November 2013
- Emmanuel Bresson, Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:

Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results. 439-465 - Ashish Kundu, Elisa Bertino:

Privacy-preserving authentication of trees and graphs. 467-494 - Yu-Shian Chen, Chin-Laung Lei:

Aggregate message authentication codes (AMACs) with on-the-fly verification. 495-504 - Fernando Pereñíguez-Garcia

, Rafael Marín López, Georgios Kambourakis
, Antonio Ruiz-Martínez
, Stefanos Gritzalis
, Antonio Fernandez Gómez-Skarmeta
:
KAMU: providing advanced user privacy in Kerberos multi-domain scenarios. 505-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














