


default search action
International Journal of Information Security, Volume 9
Volume 9, Number 1, February 2010
- Ruijuan Zheng, Mingchuan Zhang, Qingtao Wu, Shibao Sun, Jiexin Pu:

Analysis and application of Bio-Inspired Multi-Net Security Model. 1-17 - Shuihua Han, Chao-Hsien Chu

:
Content-based image authentication: current status, issues, and challenges. 19-32 - David M. Goldschlag, Stuart G. Stubblebine, Paul F. Syverson:

Temporarily hidden bit commitment and lottery applications. 33-50 - Anindya Chakraborty, Arun K. Majumdar, Shamik Sural

:
A column dependency-based approach for static and dynamic recovery of databases from malicious transactions. 51-67 - Duncan Bayly, Maurice Castro, Arathi Arakala, Jason Jeffers, Kathy J. Horadam:

Fractional biometrics: safeguarding privacy in biometric applications. 69-82
Volume 9, Number 2, April 2010
- Giampaolo Bella

:
The principle of guarantee availability for security protocol analysis. 83-97 - João Porto de Albuquerque

, Heiko Krumm, Paulo Lício de Geus
:
Formal validation of automated policy refinement in the management of network security systems. 99-125 - Lars R. Knudsen

, Charlotte V. Miolane:
Counting equations in algebraic attacks on block ciphers. 127-135 - Praveen Gauravaram

, John Kelsey
, Lars R. Knudsen
, Søren S. Thomsen:
On hash functions using checksums. 137-151
Volume 9, Number 3, June 2010
- Ching Lin, Vijay Varadharajan

:
MobileTrust: a trust enhanced security architecture for mobile agent systems. 153-178 - Amlan Kundu, Shamik Sural

, Arun K. Majumdar:
Database intrusion detection using sequence alignment. 179-191 - Ileana Buhan, Jeroen Doumen, Pieter H. Hartel

, Qiang Tang
, Raymond N. J. Veldhuis:
Embedding renewable cryptographic keys into noisy data. 193-208 - Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula

:
A delegation model for extended RBAC. 209-236
Volume 9, Number 4, August 2010
- Xuhua Ding

, Yanjiang Yang, Robert H. Deng
, Shuhong Wang:
A new hardware-assisted PIR with O(n) shuffle cost. 237-252 - Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo

:
EXAM: a comprehensive environment for the analysis of access control policies. 253-273 - Alwyn Roshan Pais

, Shankar Joshi:
A new probabilistic rekeying method for secure multicast groups. 275-286 - Joseph K. Liu

, Joonsang Baek
, Jianying Zhou
, Yanjiang Yang, Jun Wen Wong:
Efficient online/offline identity-based signature for wireless sensor network. 287-296 - Tsz Hon Yuen

, Willy Susilo
, Yi Mu:
How to construct identity-based signatures without the key escrow problem. 297-311
Volume 9, Number 5, October 2010
- Benoît Dupasquier, Stefan Burschka, Kieran McLaughlin, Sakir Sezer:

Analysis of information leakage from encrypted Skype conversations. 313-325 - Boris Skoric, Marc X. Makkes

:
Flowchart description of security primitives for controlled physical unclonable functions. 327-335 - Hedieh Sajedi

, Mansour Jamzad:
Using contourlet transform and cover selection for secure steganography. 337-352 - Haiyong Chen, Hailiang Chen

:
A hybrid scheme for securing fingerprint templates. 353-361 - Yoo-Jin Baek:

Regular 2w-ary right-to-left exponentiation algorithm with very efficient DPA and FA countermeasures. 363-370
Volume 9, Number 6, December 2010
- Ivan Damgård, Mads Jurik, Jesper Buus Nielsen

:
A generalization of Paillier's public-key system with applications to electronic voting. 371-385 - Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan:

Password-authenticated key exchange based on RSA. 387-410 - Moni Naor, Benny Pinkas:

Efficient trace and revoke schemes. 411-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














