default search action
International Journal of Information Security, Volume 18
Volume 18, Number 1, February 2019
- Debasish Das, Utpal Sharma, D. K. Bhattacharyya:
Defeating SQL injection attack in authentication security: an experimental study. 1-22 - Dipankar Dasgupta, Abhijit Kumar Nag, Denise Ferebee, Sanjib Kumar Saha, Kul Prasad Subedi, Arunava Roy, Alvaro Madero, Abel Sanchez, John R. Williams:
Design and implementation of Negative Authentication System. 23-48 - Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis:
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications. 49-72 - Gerson de Souza Faria, Hae Yong Kim:
Differential audio analysis: a new side-channel attack on PIN pads. 73-84 - Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM. 85-100 - M. Francisca Hinarejos, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Deployment and performance evaluation of mobile multicoupon solutions. 101-124
Volume 18, Number 2, April 2019
- Gábor György Gulyás, Sándor Imre:
Hiding information against structural re-identification. 125-139 - Jian-Wu Zheng, Jing Zhao, Xin-Ping Guan:
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy. 141-162 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptanalytic time-memory trade-off for password hashing schemes. 163-180 - Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device anonymous authentication. 181-197 - Ankit Shah, Rajesh Ganesan, Sushil Jajodia:
A methodology for ensuring fair allocation of CSOC effort for alert investigation. 199-218 - Miguel Ros-Martín, Julián Salas, Jordi Casas-Roma:
Scalable non-deterministic clustering-based k-anonymization for rich networks. 219-238 - Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to. 239-255
Volume 18, Number 3, June 2019
- Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Fabio Martinelli, Francesco Mercaldo:
Dynamic malware detection and phylogeny analysis using process mining. 257-284 - Krzysztof Grining, Marek Klonowski, Piotr Syga:
On practical privacy-preserving fault-tolerant data aggregation. 285-304 - Aishwarya Vipul Vora, Saumya Hegde:
Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter. 305-319 - Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. 321-331 - Benedikt Hiemenz, Michel Krämer:
Dynamic searchable symmetric encryption for storing geospatial data in the cloud. 333-354 - Wen Gao, Liqun Chen, Yupu Hu, Christopher J. P. Newton, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. 355-370 - Mohammad Hasan Samadani, Mehdi Berenjkoub, Marina Blanton:
Secure pattern matching based on bit parallelism - Non-interactive protocols for non-deterministic string matching automata evaluation. 371-391
Volume 18, Number 4, August 2019
- Yusuf Kulah, Berkay Dincer, Cemal Yilmaz, Erkay Savas:
SpyDetector: An approach for detecting side-channel attacks at runtime. 393-422 - Mohammad Reza Faghani, Uyen Trang Nguyen:
Mobile botnets meet social networks: design and analysis of a new type of botnet. 423-449 - Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Double-spending prevention for Bitcoin zero-confirmation transactions. 451-463 - Mohsen Rezvani, David Rajaratnam, Aleksandar Ignjatovic, Maurice Pagnucco, Sanjay Jha:
Analyzing XACML policies using answer set programming. 465-479 - Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
You click, I steal: analyzing and detecting click hijacking attacks in web pages. 481-504 - João S. Resende, Patrícia R. Sousa, Rolando Martins, Luis Antunes:
Breaking MPC implementations through compression. 505-518 - Hector Marco-Gisbert, Ismael Ripoll-Ripoll:
SSPFA: effective stack smashing protection for Android OS. 519-532
Volume 18, Number 5, October 2019
- Oriol Farràs, Jordi Ribes-González:
Provably secure public-key encryption with conjunctive and subset keyword search. 533-548 - James Dyer, Martin E. Dyer, Jie Xu:
Practical homomorphic encryption over the integers for secure computation in the cloud. 549-579 - Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature schemes with a fuzzy private key. 581-617 - Parvin Rastegari, Willy Susilo, Mohammad Dakhilalian:
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model. 619-635 - Ricard Garra, Dominik Leibenger, Josep M. Miret, Francesc Sebé:
Repairing an aggregation-based smart metering system. 637-646 - Xiaoying Yu, Qi Liao:
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization. 647-663 - Amel Meddeb-Makhlouf, Mohsen Guizani:
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications. 665-676
Volume 18, Number 6, December 2019
- Yixian Cai, George Karakostas, Alan Wassyng:
Secure and trusted partial grey-box verification. 677-700 - Tao Zhang, Lee Wang Hao, Mingyuan Gao, Jianying Zhou:
File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation. 701-713 - Raúl Riesco, Víctor A. Villagrá:
Leveraging cyber threat intelligence for a dynamic risk framework - Automation by using a semantic reasoner and a new combination of standards (STIX™, SWRL and OWL). 715-739 - Merve Yildirim, Ian Mackie:
Encouraging users to improve password security and memorability. 741-759 - Muhammad Aamir, Syed Mustafa Ali Zaidi:
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. 761-785 - Constantinos Patsakis, Fran Casino:
Hydras and IPFS: a decentralised playground for malware. 787-799 - Ehsan Toreini, Siamak F. Shahandashti, Maryam Mehrnezhad, Feng Hao:
DOMtegrity: ensuring web page integrity against malicious browser extensions. 801-814
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.