


default search action
International Journal of Information Security, Volume 18
Volume 18, Number 1, February 2019
- Debasish Das, Utpal Sharma, D. K. Bhattacharyya

:
Defeating SQL injection attack in authentication security: an experimental study. 1-22 - Dipankar Dasgupta

, Abhijit Kumar Nag, Denise Ferebee, Sanjib Kumar Saha, Kul Prasad Subedi, Arunava Roy, Alvaro Madero, Abel Sanchez, John R. Williams:
Design and implementation of Negative Authentication System. 23-48 - Anastasios Stasinopoulos, Christoforos Ntantogian

, Christos Xenakis
:
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications. 49-72 - Gerson de Souza Faria

, Hae Yong Kim
:
Differential audio analysis: a new side-channel attack on PIN pads. 73-84 - Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:

Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM. 85-100 - M. Francisca Hinarejos

, Andreu-Pere Isern-Deyà
, Josep-Lluís Ferrer-Gomila
, Llorenç Huguet i Rotger:
Deployment and performance evaluation of mobile multicoupon solutions. 101-124
Volume 18, Number 2, April 2019
- Gábor György Gulyás, Sándor Imre

:
Hiding information against structural re-identification. 125-139 - Jian-Wu Zheng, Jing Zhao, Xin-Ping Guan:

Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy. 141-162 - Donghoon Chang, Arpan Jati, Sweta Mishra

, Somitra Kumar Sanadhya
:
Cryptanalytic time-memory trade-off for password hashing schemes. 163-180 - Kamil Kluczniak

, Jianfeng Wang
, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device anonymous authentication. 181-197 - Ankit Shah, Rajesh Ganesan, Sushil Jajodia

:
A methodology for ensuring fair allocation of CSOC effort for alert investigation. 199-218 - Miguel Ros-Martín, Julián Salas, Jordi Casas-Roma

:
Scalable non-deterministic clustering-based k-anonymization for rich networks. 219-238 - Zeinab Joudaki, Julie Thorpe

, Miguel Vargas Martin:
Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to. 239-255
Volume 18, Number 3, June 2019
- Mario Luca Bernardi

, Marta Cimitile
, Damiano Distante
, Fabio Martinelli, Francesco Mercaldo:
Dynamic malware detection and phylogeny analysis using process mining. 257-284 - Krzysztof Grining, Marek Klonowski

, Piotr Syga
:
On practical privacy-preserving fault-tolerant data aggregation. 285-304 - Aishwarya Vipul Vora

, Saumya Hegde
:
Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter. 305-319 - Ge Wu

, Yi Mu, Willy Susilo
, Fuchun Guo
, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. 321-331 - Benedikt Hiemenz, Michel Krämer

:
Dynamic searchable symmetric encryption for storing geospatial data in the cloud. 333-354 - Wen Gao, Liqun Chen

, Yupu Hu, Christopher J. P. Newton
, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. 355-370 - Mohammad Hasan Samadani, Mehdi Berenjkoub, Marina Blanton

:
Secure pattern matching based on bit parallelism - Non-interactive protocols for non-deterministic string matching automata evaluation. 371-391
Volume 18, Number 4, August 2019
- Yusuf Kulah, Berkay Dincer, Cemal Yilmaz

, Erkay Savas:
SpyDetector: An approach for detecting side-channel attacks at runtime. 393-422 - Mohammad Reza Faghani

, Uyen Trang Nguyen:
Mobile botnets meet social networks: design and analysis of a new type of botnet. 423-449 - Cristina Pérez-Solà

, Sergi Delgado-Segura
, Guillermo Navarro-Arribas
, Jordi Herrera-Joancomartí
:
Double-spending prevention for Bitcoin zero-confirmation transactions. 451-463 - Mohsen Rezvani

, David Rajaratnam
, Aleksandar Ignjatovic, Maurice Pagnucco
, Sanjay Jha
:
Analyzing XACML policies using answer set programming. 465-479 - Anil Saini, Manoj Singh Gaur, Vijay Laxmi

, Mauro Conti
:
You click, I steal: analyzing and detecting click hijacking attacks in web pages. 481-504 - João S. Resende

, Patrícia R. Sousa
, Rolando Martins
, Luis Antunes
:
Breaking MPC implementations through compression. 505-518 - Hector Marco-Gisbert

, Ismael Ripoll-Ripoll
:
SSPFA: effective stack smashing protection for Android OS. 519-532
Volume 18, Number 5, October 2019
- Oriol Farràs

, Jordi Ribes-González
:
Provably secure public-key encryption with conjunctive and subset keyword search. 533-548 - James Dyer

, Martin E. Dyer
, Jie Xu:
Practical homomorphic encryption over the integers for secure computation in the cloud. 549-579 - Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki

:
Signature schemes with a fuzzy private key. 581-617 - Parvin Rastegari, Willy Susilo

, Mohammad Dakhilalian
:
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model. 619-635 - Ricard Garra, Dominik Leibenger, Josep M. Miret, Francesc Sebé

:
Repairing an aggregation-based smart metering system. 637-646 - Xiaoying Yu, Qi Liao

:
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization. 647-663 - Amel Meddeb-Makhlouf

, Mohsen Guizani:
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications. 665-676
Volume 18, Number 6, December 2019
- Yixian Cai, George Karakostas

, Alan Wassyng:
Secure and trusted partial grey-box verification. 677-700 - Tao Zhang

, Lee Wang Hao, Mingyuan Gao, Jianying Zhou
:
File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation. 701-713 - Raúl Riesco

, Víctor A. Villagrá
:
Leveraging cyber threat intelligence for a dynamic risk framework - Automation by using a semantic reasoner and a new combination of standards (STIX™, SWRL and OWL). 715-739 - Merve Yildirim, Ian Mackie:

Encouraging users to improve password security and memorability. 741-759 - Muhammad Aamir, Syed Mustafa Ali Zaidi:

DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. 761-785 - Constantinos Patsakis

, Fran Casino
:
Hydras and IPFS: a decentralised playground for malware. 787-799 - Ehsan Toreini

, Siamak F. Shahandashti, Maryam Mehrnezhad
, Feng Hao
:
DOMtegrity: ensuring web page integrity against malicious browser extensions. 801-814

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














