


default search action
International Journal of Information Security, Volume 19
Volume 19, Number 1, February 2020
- Takeshi Takahashi, Rodrigo Roman Castro, Bilhanan Silverajan, Ryan K. L. Ko

, Said Tabet:
Message from the guest editors. 1-2 - Peter Aufner

:
The IoT security gap: a look down into the valley between threat models and their implementation. 3-14 - Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe

:
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). 15-38 - Raz Ben Yehuda, Nezer Jacob Zaidenberg

:
Protection against reverse engineering in ARM. 39-51 - Ili Ko

, Desmond Chambers, Enda Barrett:
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain. 53-70 - Hayate Takase

, Ryotaro Kobayashi
, Masahiko Kato, Ren Ohmura:
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. 71-81 - Seiichi Ozawa

, Tao Ban, Naoki Hashimoto, Junji Nakazato, Jumpei Shimamura:
A study of IoT malware activities using association rule learning for darknet sensor data. 83-92 - Behshid Shayesteh, Vesal Hakami

, Ahmad Akbari
:
A trust management scheme for IoT-enabled environmental health/accessibility monitoring services. 93-110 - Davide Ferraris

, M. Carmen Fernández Gago:
TrUStAPIS: a trust requirements elicitation method for IoT. 111-127 - K. Sowjanya

, Mou Dasgupta
, Sangram Ray
:
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. 129-146
Volume 19, Number 2, April 2020
- Rajendra Patil

, Harsha Dudeja, Chirag Modi
:
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. 147-162 - Ben Attia Hasiba, Laid Kahloul

, Saber Benhazrallah, Samir Bourekkache
:
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies. 163-187 - Sridhar Adepu

, Nandha Kumar Kandasamy, Jianying Zhou
, Aditya Mathur:
Attacks on smart grid: power supply interruption and malicious power generation. 189-211 - Peng Cheng, Ibrahim Ethem Bagci

, Utz Roedig
, Jeff Yan:
SonarSnoop: active acoustic side-channel attacks. 213-228 - Sanjeet Kumar Nayak

, Somanath Tripathy
:
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage. 229-240 - Ben Attia Hasiba, Laid Kahloul

, Saber Benharzallah
, Samir Bourekkache
:
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies. 241
Volume 19, Number 3, June 2020
- Kuo-Hui Yeh, Chunhua Su, Robert H. Deng

, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. 243-244 - Chun-I Fan

, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks. 245-255 - Alexander Yohan

, Nai-Wei Lo
:
FOTB: a secure blockchain-based firmware update framework for IoT environment. 257-278 - Weizhi Meng

, Wenjuan Li
, Laurence T. Yang, Peng Li:
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. 279-290 - Or Sattath

:
On the insecurity of quantum Bitcoin mining. 291-302 - Yuanjian Zhou, Yining Liu

, Chengshun Jiang, Shulan Wang:
An improved FOO voting scheme using blockchain. 303-310 - Zijian Bao, Wenbo Shi, Saru Kumari

, Zhiyin Kong, Chien-Ming Chen
:
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. 311-321 - Shufan Zhang

, Lili Wang, Hu Xiong:
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability. 323-341
Volume 19, Number 4, August 2020
- Marco Tiloca, Gianluca Dini

, Kiki Rizki, Shahid Raza
:
Group rekeying based on member join history. 343-381 - Minhye Seo, Suhri Kim, Dong Hoon Lee, Jong Hwan Park:

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method. 383-399 - Michael Hölzl

, Michael Roland
, Omid Mir
, René Mayrhofer
:
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation. 401-417 - Wakaha Ogata

, Takaaki Otemori:
Security analysis of secure kNN and ranked keyword search over encrypted data. 419-425 - Matthias Pilz

, Fariborz Baghaei Naeini
, Ketil Grammont, Coline Smagghe, Mastaneh Davis
, Jean-Christophe Nebel
, Luluwah Al-Fagih
, Eckhard Pfluegel
:
Security attacks on smart grid scheduling and their defences: a game-theoretic approach. 427-443 - Itaru Ueda, Daiki Miyahara

, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki
, Hideaki Sone:
Secure implementations of a random bisection cut. 445-452 - Chun-Hui Wu, Xiaofeng Chen, Willy Susilo

:
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets. 453-464 - Jordi Casas-Roma

:
DUEF-GA: data utility and privacy evaluation framework for graph anonymization. 465-478 - Dimitris Mitropoulos

, Thodoris Sotiropoulos, Nikos Koutsovasilis, Diomidis Spinellis
:
PDGuard: an architecture for the control and secure processing of personal data. 479-498
Volume 19, Number 5, October 2020
- Mina Sheikhalishahi, Andrea Saracino

, Fabio Martinelli, Antonio La Marra, Mohammed Mejri, Nadia Tawbi
:
Digital Waste Disposal: an automated framework for analysis of spam emails. 499-522 - Areej Alzaidi, Suhair Alshehri

, Seyed M. Buhari:
DroidRista: a highly precise static data flow analysis framework for android applications. 523-536 - Vicenç Torra

:
Random dictatorship for privacy-preserving social choice. 537-545 - Riccardo Bernardini

, Roberto Rinaldo:
Analysis of some simple stabilizers for physically obfuscated keys. 547-565 - Huy-Trung Nguyen

, Quoc-Dung Ngo, Van-Hoang Le
:
A novel graph-based approach for IoT botnet detection. 567-577 - Ahmed Manasrah, Areej R. AL-Rabadi, Najib A. Kofahi:

Key pre-distribution approach using block LU decomposition in wireless sensor network. 579-596 - Sona Taheri

, Adil M. Bagirov, Iqbal Gondal
, Simon Brown:
Cyberattack triage using incremental clustering for intrusion detection systems. 597-607
Volume 19, Number 6, December 2020
- Britta Hale

:
User-mediated authentication protocols and unforgeability in key collision. 609-621 - Pablo Picazo-Sanchez

, Juan Tapiador
, Gerardo Schneider:
After you, please: browser extensions order attacks and countermeasures. 623-638 - Yanting Zhang

, Jianwei Liu
, Zongyang Zhang
, Weiran Liu:
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices. 639-656 - Kamalakanta Sethi, E. Sai Rupesh, Rahul Kumar, Padmalochan Bera, Venu Madhav Yatam:

A context-aware robust intrusion detection system: a reinforcement learning-based approach. 657-678 - Reem Melki

, Hassan N. Noura
, Ali Chehab
:
Lightweight multi-factor mutual authentication protocol for IoT devices. 679-694 - Tina Tavizi, Mehdi Shajari:

A language and a pattern system for temporal property specification: advanced metering infrastructure case study. 695-710 - Lixue Sun

, Chunxiang Xu, Yuan Zhang, Kefei Chen:
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. 711-720

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














