Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             152 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A case study in hardware Trojan design and implementation Baumgarten, Alex
2010
1 p. 1-14
artikel
2 Achieving dynamicity in security policies enforcement using aspects Ayed, Samiha
2017
1 p. 83-103
artikel
3 A column dependency-based approach for static and dynamic recovery of databases from malicious transactions Chakraborty, Anindya
2009
1 p. 51-67
artikel
4 A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets Shaikh, Riaz Ahmed
2016
1 p. 91-113
artikel
5 A deep learner model for multi-language webshell detection Hannousse, Abdelhakim

1 p. 47-61
artikel
6 A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation Rajasekaran, Arun Sekar

1 p. 1-13
artikel
7 A formalization of card-based cryptographic protocols via abstract machine Mizuki, Takaaki
2013
1 p. 15-23
artikel
8 A formal modeling and analysis approach for access control rules, policies, and their combinations Karimi, Vahid R.
2016
1 p. 43-74
artikel
9 A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) Rabie, Osama Bassam J.

1 p. 51-80
artikel
10 A general and efficient countermeasure to relation attacks in mix-based e-voting Peng, Kun
2010
1 p. 49-60
artikel
11 A multiresolution approach for optimal defense against random attacks Valenzuela, Michael
2014
1 p. 61-72
artikel
12 Analysing a stream authentication protocol using model checking Hopcroft, Philippa
2004
1 p. 2-13
artikel
13 Analysis and application of Bio-Inspired Multi-Net Security Model Zheng, Ruijuan
2009
1 p. 1-17
artikel
14 Analysis of e-commerce protocols: Adapting a traditional technique Gürgens, Sigrid
2003
1 p. 21-36
artikel
15 An attack on the isomorphisms of polynomials problem with one secret Geiselmann, Willi
2003
1 p. 59-64
artikel
16 A new efficient optimistic fair exchange protocol without random oracles Huang, Qiong
2011
1 p. 53-63
artikel
17 A new smart smudge attack using CNN Shin, Hansub

1 p. 25-36
artikel
18 An extended access control mechanism exploiting data dependencies Albertini, Davide Alberto
2016
1 p. 75-89
artikel
19 An integrated deep learning model for Ethereum smart contract vulnerability detection Jain, Vikas Kumar

1 p. 557-575
artikel
20 A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network Sharma, Amit

1 p. 119-135
artikel
21 A review on fake news detection 3T’s: typology, time of detection, taxonomies Rastogi, Shubhangi

1 p. 177-212
artikel
22 A review on graph-based approaches for network security monitoring and botnet detection Lagraa, Sofiane

1 p. 119-140
artikel
23 A symbolic framework for multi-faceted security protocol analysis Bracciali, Andrea
2007
1 p. 55-84
artikel
24 A t-private k-database information retrieval scheme Blundo, Carlo
2001
1 p. 64-68
artikel
25 Authenticating mobile phone users using keystroke analysis Clarke, N. L.
2006
1 p. 1-14
artikel
26 Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0 Stergiopoulos, George

1 p. 37-59
artikel
27 A warning on how to implement anonymous credential protocols into the information card framework Ates, Mikaël
2011
1 p. 33-40
artikel
28 BASPED: Blockchain assisted searchable public key encryption over outsourced data Chakraborty, Partha Sarathi

1 p. 487-503
artikel
29 Bayesian rational exchange Estevez-Tapiador, Juan M.
2007
1 p. 85-100
artikel
30 Bipartite modular multiplication with twice the bit-length of multipliers Yoshino, Masayuki
2008
1 p. 13-23
artikel
31 Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications Deepa, G.
2017
1 p. 105-120
artikel
32 Blockchain-based data integrity framework for Internet of Things Chanal, Poornima M.

1 p. 519-532
artikel
33 Blockchain-based multi-diagnosis deep learning application for various diseases classification Rahal, Hakima Rym

1 p. 15-30
artikel
34 Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications Stasinopoulos, Anastasios
2018
1 p. 49-72
artikel
35 Computational probabilistic noninterference Backes, Michael
2004
1 p. 42-60
artikel
36 Computer security Landwehr, Carl E.
2001
1 p. 3-13
artikel
37 Conference key agreement protocol with non-interactive fault-tolerance over broadcast network Cheng, Jiin-Chiou
2008
1 p. 37-48
artikel
38 Content-based filtering of Web documents: the MaX system and the EUFORBIA project Bertino, Elisa
2003
1 p. 45-58
artikel
39 Content-based image authentication: current status, issues, and challenges Han, Shui-Hua
2009
1 p. 19-32
artikel
40 Controlled query evaluation for enforcing confidentiality in complete information systems Biskup, Joachim
2004
1 p. 14-27
artikel
41 Correction to: A decentralized honeypot for IoT Protocols based on Android devices Lygerou, Irini

1 p. 303
artikel
42 Cryptanalysis of a non-interactive deniable ring signature scheme Jia, Huiwen

1 p. 103-112
artikel
43 Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth Amro, Ahmed

1 p. 249-288
artikel
44 Cybersecurity challenges in IoT-based smart renewable energy Rekeraho, Alexandre

1 p. 101-117
artikel
45 Cyber threat assessment and management for securing healthcare ecosystems using natural language processing Silvestri, Stefano

1 p. 31-50
artikel
46 DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules Kim, Hee Yeon

1 p. 1-23
artikel
47 Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system Mohamed, Safa

1 p. 235-247
artikel
48 Defeating SQL injection attack in authentication security: an experimental study Das, Debasish
2017
1 p. 1-22
artikel
49 Deployment and performance evaluation of mobile multicoupon solutions Hinarejos, M. Francisca
2018
1 p. 101-124
artikel
50 Design and implementation of Negative Authentication System Dasgupta, Dipankar
2017
1 p. 23-48
artikel
51 Detection of adversarial attacks based on differences in image entropy Ryu, Gwonsang

1 p. 299-314
artikel
52 Differential audio analysis: a new side-channel attack on PIN pads Souza Faria, Gerson de
2018
1 p. 73-84
artikel
53 Distributing security-mediated PKI Vanrenen, Gabriel
2005
1 p. 3-17
artikel
54 Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps El-Zawawy, Mohamed A.

1 p. 39-58
artikel
55 Double-authentication-preventing signatures Poettering, Bertram
2015
1 p. 1-22
artikel
56 Double-trapdoor anonymous tags for traceable signatures Abe, Masayuki
2012
1 p. 19-31
artikel
57 Early web application attack detection using network traffic analysis Rajić, Branislav

1 p. 77-91
artikel
58 Editorial Gollman, Dieter
2001
1 p. 1-2
artikel
59 Efficient attribute-based signature and signcryption realizing expressive access structures Rao, Y. Sreenivasa
2015
1 p. 81-109
artikel
60 Efficient generation of secure elliptic curves Konstantinou, Elisavet
2006
1 p. 47-63
artikel
61 Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network Dinesh, K.

1 p. 199-223
artikel
62 Enhancing attack resilience of cyber-physical systems through state dependency graph models Adamos, Konstantinos

1 p. 187-198
artikel
63 Estimating vulnerability metrics with word embedding and multiclass classification methods Kekül, Hakan

1 p. 247-270
artikel
64 Federated transfer learning for attack detection for Internet of Medical Things Alharbi, Afnan A.

1 p. 81-100
artikel
65 Forensic investigation of the dark web on the Tor network: pathway toward the surface web Jin, Philgeun

1 p. 331-346
artikel
66 Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs Yoneyama, Kazuki
2016
1 p. 43-66
artikel
67 Fractional biometrics: safeguarding privacy in biometric applications Bayly, Duncan
2009
1 p. 69-82
artikel
68 Fully non-interactive onion routing with forward secrecy Catalano, Dario
2012
1 p. 33-47
artikel
69 GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks Mvah, Fabrice

1 p. 373-387
artikel
70 Generalized Elias schemes for efficient harvesting of truly random bits Bernardini, Riccardo
2016
1 p. 67-81
artikel
71 Gridchain: an investigation of privacy for the future local distribution grid Picazo-Sanchez, Pablo

1 p. 29-46
artikel
72 Group signature implies public-key encryption with non-interactive opening Emura, Keita
2013
1 p. 51-62
artikel
73 Handling distributed authorization with delegation through answer set programming Wang, Shujing
2006
1 p. 27-46
artikel
74 Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities Anjum,

1 p. 577-608
artikel
75 Identity-based cryptography for grid security Lim, Hoon Wei
2010
1 p. 15-32
artikel
76 Implementing public-key cryptography on passive RFID tags is practical Arbit, Alex
2014
1 p. 85-99
artikel
77 Improving spam email classification accuracy using ensemble techniques: a stacking approach Adnan, Muhammad

1 p. 505-517
artikel
78 INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain Farao, Aristeidis

1 p. 347-371
artikel
79 Information-theoretically secure oblivious polynomial evaluation in the commodity-based model Tonicelli, Rafael
2014
1 p. 73-84
artikel
80 Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions Mashatan, Atefeh
2008
1 p. 49-60
artikel
81 Intrusion and intrusion detection McHugh, John
2001
1 p. 14-35
artikel
82 Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches Sah, Gulab

1 p. 1-27
artikel
83 Key substitution attacks revisited: Taking into account malicious signers Bohli, Jens-Matthias
2005
1 p. 30-36
artikel
84 Large-scale network intrusion detection based on distributed learning algorithm Tian, Daxin
2008
1 p. 25-35
artikel
85 Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR Backes, Michael
2007
1 p. 33-54
artikel
86 Low-randomness constant-round private XOR computations Blundo, Carlo
2006
1 p. 15-26
artikel
87 Malicious code detection in android: the role of sequence characteristics and disassembling methods Balikcioglu, Pinar G.

1 p. 107-118
artikel
88 [m]allotROPism: a metamorphic engine for malicious software variation development Lyvas, Christos

1 p. 61-78
artikel
89 Malware analysis using visualized images and entropy graphs Han, Kyoung Soo
2014
1 p. 1-14
artikel
90 Measuring and visualizing cyber threat intelligence quality Schlette, Daniel

1 p. 21-38
artikel
91 Minimizing TTP's involvement in signature validation Zhou, Jianying
2005
1 p. 37-47
artikel
92 MLChain: a privacy-preserving model learning framework using blockchain Bansal, Vidhi

1 p. 649-677
artikel
93 Mobile botnet detection: a comprehensive survey Hamzenejadi, Sajad

1 p. 137-175
artikel
94 Modeling reporting delays in cyber incidents: an industry-level comparison Sangari, Seema

1 p. 63-76
artikel
95 Modeling runtime enforcement with mandatory results automata Dolzhenko, Egor
2014
1 p. 47-60
artikel
96 Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency Peng, Kun
2010
1 p. 33-47
artikel
97 Networked cryptographic devices resilient to capture MacKenzie, Philip
2003
1 p. 1-20
artikel
98 NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs Liu, Pengfei

1 p. 59-71
artikel
99 Obfuscated integration of software protections Van den Broeck, Jens

1 p. 73-101
artikel
100 On private information retrieval supporting range queries Hayata, Junichiro

1 p. 629-647
artikel
101 On selection of samples in algebraic attacks and a new technique to find hidden low degree equations Sušil, Petr
2015
1 p. 51-65
artikel
102 Outbound authentication for programmable secure coprocessors Smith, Sean W.
2004
1 p. 28-41
artikel
103 PatrIoT: practical and agile threat research for IoT Süren, Emre

1 p. 213-233
artikel
104 Pepal: Penalizing multimedia breaches and partial leakages Mangipudi, Easwar Vivek

1 p. 447-465
artikel
105 Perceptual hash function for scalable video Saikia, Navajit
2013
1 p. 81-93
artikel
106 PKI past, present and future Lioy, Antonio
2005
1 p. 18-29
artikel
107 Plaintext awareness in identity-based key encapsulation Manulis, Mark
2013
1 p. 25-49
artikel
108 Portfolio optimization of computer and mobile botnets Liao, Qi
2013
1 p. 1-14
artikel
109 PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks Patruni, Muralidhara Rao

1 p. 679-698
artikel
110 Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption Liu, Weiran
2015
1 p. 35-50
artikel
111 Preface Degano, Pierpaolo
2007
1 p. 1
artikel
112 Preface Waidner, Michael
2004
1 p. 1
artikel
113 Privacy preserving data sharing and analysis for edge-based architectures Sheikhalishahi, Mina

1 p. 79-101
artikel
114 Privacy-preserving revocation checking Narasimha, M.
2008
1 p. 61-75
artikel
115 Privacy-preserving smart metering revisited Rial, Alfredo
2016
1 p. 1-31
artikel
116 Private discovery of common social contacts De Cristofaro, Emiliano
2012
1 p. 49-65
artikel
117 Public key versus symmetric key cryptography in client–server authentication protocols Braeken, An

1 p. 103-114
artikel
118 Related-key rectangle attack on 36 rounds of the XTEA block cipher Lu, Jiqiang
2008
1 p. 1-11
artikel
119 Relations between the security models for certificateless encryption and ID-based key agreement Fiore, D.
2011
1 p. 1-22
artikel
120 Restricting data-leakage using fine-grained access control on OSN objects Rathore, Nemi Chandra

1 p. 93-106
artikel
121 Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM Mesbah, Abdelhak
2018
1 p. 85-100
artikel
122 Risk model development for information security in organization environment based on business perspectives Ibnugraha, Prajna Deshanta

1 p. 113-126
artikel
123 RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment Dhingra, Bhavya

1 p. 315-330
artikel
124 Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations Yaacoub, Jean-Paul A.

1 p. 115-158
artikel
125 RORI-based countermeasure selection using the OrBAC formalism Gonzalez Granadillo, Gustavo
2013
1 p. 63-79
artikel
126 Routing management for performance and security tradeoff in wireless mesh networks Silva, Helber
2014
1 p. 35-46
artikel
127 RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware Ayub, Md. Ahsan

1 p. 533-556
artikel
128 Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more Chen, Yu
2015
1 p. 15-33
artikel
129 SAT-based model-checking for security protocols analysis Armando, Alessandro
2007
1 p. 3-32
artikel
130 SDN as a defence mechanism: a comprehensive survey Ayodele, Believe

1 p. 141-185
artikel
131 Secure and collusion-resistant data aggregation from convertible tags Leontiadis, Iraklis

1 p. 1-20
artikel
132 Secure outsourcing of manufacturing compliance checks Triakosia, Aikaterini

1 p. 609-627
artikel
133 Secure pay-TV for chained hotels Deng, Hua
2016
1 p. 33-42
artikel
134 Secure three-party computational protocols for triangle area Liu, Liang
2015
1 p. 1-13
artikel
135 Security assessment and improvement of smart grid NIKE protocol Feng, Tao

1 p. 411-429
artikel
136 Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware Viţel, Silviu

1 p. 271-297
artikel
137 Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents Sommervoll, Åvald Åslaugson

1 p. 225-246
artikel
138 Simulation extractable versions of Groth’s zk-SNARK revisited Amine, Oussama

1 p. 431-445
artikel
139 Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant Elmiger, Marius

1 p. 467-485
artikel
140 Stochastic game net and applications in security analysis for enterprise network Wang, Yuanzhuo
2011
1 p. 41-52
artikel
141 Strongly simulation-extractable leakage-resilient NIZK Wang, Yuyu
2015
1 p. 67-79
artikel
142 Synthesizing differentially private location traces including co-locations Narita, Jun

1 p. 389-410
artikel
143 Temporarily hidden bit commitment and lottery applications Goldschlag, David M.
2009
1 p. 33-50
artikel
144 The Elliptic Curve Digital Signature Algorithm (ECDSA) Johnson, Don
2001
1 p. 36-63
artikel
145 The MALICIA dataset: identification and analysis of drive-by download operations Nappa, Antonio
2014
1 p. 15-33
artikel
146 Threshold distributed access control with public verification: a practical application of PVSS Peng, Kun
2011
1 p. 23-31
artikel
147 Toward tracing and revoking schemes secure against collusion and any form of secret information leakage D’Arco, Paolo
2012
1 p. 1-17
artikel
148 Track for surveys
1 p. 159
artikel
149 Understanding SPKI/SDSI using first-order logic Li, Ninghui
2005
1 p. 48-64
artikel
150 User identification using deep learning and human activity mobile sensor data Alawneh, Luay

1 p. 289-301
artikel
151 Write-only oblivious RAM-based privacy-preserved access of outsourced data Li, Lichun
2016
1 p. 23-42
artikel
152 Zheng and Seberry’s public key encryption scheme revisited Baek, Joonsang
2003
1 p. 37-44
artikel
                             152 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland