


default search action
International Journal of Information Security, Volume 10
Volume 10, Number 1, February 2011
- Alex Baumgarten, Michael Steffen, Matthew Clausman, Joseph Zambreno:

A case study in hardware Trojan design and implementation. 1-14 - Hoon Wei Lim, Kenneth G. Paterson:

Identity-based cryptography for grid security. 15-32 - Kun Peng, Ed Dawson

, Feng Bao:
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. 33-47 - Kun Peng:

A general and efficient countermeasure to relation attacks in mix-based e-voting. 49-60
Volume 10, Number 2, June 2011
- George Coker, Joshua D. Guttman

, Peter A. Loscocco, Amy L. Herzog, Jonathan K. Millen, Brian O'Hanlon, John D. Ramsdell, Ariel Segall, Justin Sheehy
, Brian T. Sniffen:
Principles of remote attestation. 63-81 - Alessandra Di Pierro

, Chris Hankin
, Herbert Wiklicky:
Probabilistic timing covert channels: to close or not to close? 83-106 - Michael Backes, Iliano Cervesato

, Aaron D. Jaggard
, Andre Scedrov
, Joe-Kai Tsay:
Cryptographically sound security proofs for basic and public-key Kerberos. 107-134
Volume 10, Number 3, June 2011
- Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, Geraint Price:

User-friendly and certificate-free grid security infrastructure. 137-153 - Wen Tao Zhu, Yang Xiang

, Jianying Zhou
, Robert H. Deng
, Feng Bao:
Secure localization with attack detection in wireless sensor networks. 155-171 - Peter Roelse:

Dynamic subtree tracing and its application in pay-TV systems. 173-187 - Aniket Kate, Ian Goldberg:

Generalizing cryptosystems based on the subset sum problem. 189-199
Volume 10, Number 4, August 2011
- Berkant Ustaoglu

:
Integrating identity-based and certificate-based authenticated key exchange protocols. 201-212 - Nitesh Saxena, Jonathan Voris:

Data remanence effects on memory-based entropy collection for RFID systems. 213-222 - Yacine Bouzida, Luigi Logrippo, Serge Mankovski:

Concrete- and abstract-based access control. 223-238 - Nataliia Bielova

, Fabio Massacci
:
Do you really mean what you actually enforced? - Edited automata revisited. 239-254 - Neil Hanley, Michael Tunstall

, William P. Marnane
:
Using templates to distinguish multiplications from squaring operations. 255-266
Volume 10, Number 5, October 2011
- Sushil Jajodia

, Jianying Zhou
:
Message from the Guest Editors. 267-268 - Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:

SAS: semantics aware signature generation for polymorphic worm detection. 269-283 - Ee-Chien Chang

, Liming Lu
, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing host security using external environment sensors. 285-299 - Luciana Marconi, Mauro Conti

, Roberto Di Pietro
:
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection. 301-319
Volume 10, Number 6, November 2011
- John Charles Gyorffy, Andrew F. Tappenden, James Miller:

Token-based graphical password authentication. 321-336 - William Bradley Glisson

, Tim Storer, Gavin Mayall, Iain Moug, George Grispos
:
Electronic retention: what does your mobile phone reveal about you? 337-349 - Sergio Sánchez García, Ana Gómez Oliva

, Emilia Pérez Belleboni, Iván Pau de la Cruz
:
Solving identity delegation problem in the e-government environment. 351-372 - Qiong Huang, Guomin Yang

, Duncan S. Wong, Willy Susilo
:
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. 373-385 - Josep M. Miret

, Francesc Sebé
:
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks. 387-389 - Peter Roelse:

Erratum to: Dynamic subtree tracing and its application in pay-TV systems. 391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














