Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             127 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain Ghorbel, Amal

3 p. 489-508
artikel
2 A certificateless approach to onion routing Catalano, Dario
2016
3 p. 327-343
artikel
3 A content-based deep intrusion detection system Soltani, Mahdi

3 p. 547-562
artikel
4 Active authentication for mobile devices utilising behaviour profiling Li, Fudong
2013
3 p. 229-244
artikel
5 A delegation model for extended RBAC Ben-Ghorbel-Talbi, Meriam
2010
3 p. 209-236
artikel
6 A key management scheme evaluation using Markov processes Ragab-Hassen, Hani
2016
3 p. 271-280
artikel
7 All-or-Nothing Transforms as a countermeasure to differential side-channel analysis McEvoy, Robert P.
2013
3 p. 291-304
artikel
8 A modified exhaustive search on a password system using SHA-1 Kim, Minchul
2016
3 p. 263-269
artikel
9 A monitoring system for detecting repeated packets with applications to computer worms van Oorschot, Paul C.

3 p. 186-199
artikel
10 A monitoring system for detecting repeated packets with applications to computer worms Oorschot, Paul C. van
2006
3 p. 186-199
artikel
11 Analysis of two authorization protocols using Colored Petri Nets Seifi, Younes
2014
3 p. 221-247
artikel
12 Analyzing SLE 88 memory management security using Interacting State Machines von Oheimb, David
2005
3 p. 155-171
artikel
13 A new algorithm for low-deterministic security Giffhorn, Dennis
2014
3 p. 263-287
artikel
14 A new electronic check system with reusable refunds Kim, S.
2002
3 p. 175-188
artikel
15 An improved FOO voting scheme using blockchain Zhou, Yuanjian

3 p. 303-310
artikel
16 An intrusion detection and prevention system for IMS and VoIP services Vrakas, Nikos
2013
3 p. 201-217
artikel
17 Anomalous behavior detection-based approach for authenticating smart home system users Amraoui, Noureddine

3 p. 611-636
artikel
18 Anonymity in traceable cloud data broadcast system with simultaneous individual messaging Mandal, Mriganka

3 p. 405-430
artikel
19 Anonymous attestation with user-controlled linkability Bernhard, D.
2013
3 p. 219-249
artikel
20 Anonymous subject identification and privacy information management in video surveillance Luo, Ying
2017
3 p. 261-278
artikel
21 A novel frame switching model based on virtual MAC in SDN Song, Guangjia

3 p. 723-736
artikel
22 A novel scalable intrusion detection system based on deep learning Mighan, Soosan Naderi

3 p. 387-403
artikel
23 Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF Aniello, Leonardo

3 p. 445-460
artikel
24 A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks Das, Ashok Kumar
2012
3 p. 189-211
artikel
25 A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces Zhang, Lu

3 p. 509-525
artikel
26 Attacking a polynomial-based cryptosystem: Polly Cracker Steinwandt, Rainer
2002
3 p. 143-148
artikel
27 Automated inference of past action instances in digital investigations James, Joshua I.
2014
3 p. 249-261
artikel
28 A wrinkle in time: a case study in DNS poisoning Berger, Harel

3 p. 313-329
artikel
29 Broadcast anonymous routing (BAR): scalable real-time anonymous communication Kotzanikolaou, Panayiotis
2016
3 p. 313-326
artikel
30 Broadcast encryption with dealership Gritti, Clémentine
2015
3 p. 271-283
artikel
31 Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability Zhang, Shufan

3 p. 323-341
artikel
32 ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN Benarfa, Abdelmadjid

3 p. 269-285
artikel
33 Compliant cryptologic protocols Dawson, Ed
2002
3 p. 189-202
artikel
34 Cyber insurance: state of the art, trends and future directions Tsohou, Aggeliki

3 p. 737-748
artikel
35 Cyber–physical risk assessment for false data injection attacks considering moving target defences Higgins, Martin

3 p. 579-589
artikel
36 Cyber security in New Space Manulis, M.

3 p. 287-311
artikel
37 Database intrusion detection using sequence alignment Kundu, Amlan
2010
3 p. 179-191
artikel
38 Data space randomization for securing cyber-physical systems Potteiger, Bradley

3 p. 597-610
artikel
39 Defeating traffic analysis via differential privacy: a case study on streaming traffic Zhang, Xiaokuan

3 p. 689-706
artikel
40 Definition of an advanced identity management infrastructure Dólera Tormo, Ginés
2012
3 p. 173-200
artikel
41 Dependency-based security risk assessment for cyber-physical systems Akbarzadeh, Aida

3 p. 563-578
artikel
42 Design and implementation of a secure and trustworthy platform for privacy-aware video surveillance Martínez-Ballesté, Antoni
2017
3 p. 279-290
artikel
43 Detection and analysis of eavesdropping in anonymous communication networks Chakravarty, Sambuddho
2014
3 p. 205-220
artikel
44 Detection of firewall configuration errors with updatable tree Abbes, Tarek
2015
3 p. 301-317
artikel
45 Distributed star coloring of network for IP traceback Roy, Sangita
2017
3 p. 315-326
artikel
46 Dynamic group size accreditation and group discounts preserving anonymity Domingo-Ferrer, Josep
2017
3 p. 243-260
artikel
47 Dynamic malware detection and phylogeny analysis using process mining Bernardi, Mario Luca
2018
3 p. 257-284
artikel
48 Dynamic searchable symmetric encryption for storing geospatial data in the cloud Hiemenz, Benedikt
2018
3 p. 333-354
artikel
49 Dynamic subtree tracing and its application in pay-TV systems Roelse, Peter
2011
3 p. 173-187
artikel
50 Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems Salini, P.
2015
3 p. 319-334
artikel
51 Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment Chen, Yingchun

3 p. 679-689
artikel
52 Efficient attribute-based encryption with repeated attributes optimization Khan, Fawad

3 p. 431-444
artikel
53 Efficient identity-based GQ multisignatures Harn, Lein
2008
3 p. 205-210
artikel
54 Efficient identity-based online/offline encryption and signcryption with short ciphertext Lai, Jianchang
2016
3 p. 299-311
artikel
55 Efficient parallelizable hashing using small non-compressing primitives Mennink, Bart
2015
3 p. 285-300
artikel
56 Elastic block ciphers: method, security and instantiations Cook, Debra L.
2008
3 p. 211-231
artikel
57 Embedding renewable cryptographic keys into noisy data Buhan, Ileana
2010
3 p. 193-208
artikel
58 Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain Meng, Weizhi

3 p. 279-290
artikel
59 Entropy analysis to classify unknown packing algorithms for malware detection Bat-Erdene, Munkhbayar
2016
3 p. 227-248
artikel
60 Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture Bhattacharjya, Sairath

3 p. 427-436
artikel
61 Estimating the maximum information leakage Aldini, Alessandro
2007
3 p. 219-242
artikel
62 Evaluating differentially private decision tree model over model inversion attack Park, Cheolhee

3 p. 1-14
artikel
63 Evaluating visualization approaches to detect abnormal activities in network traffic data Ji, Soo-Yeon

3 p. 331-345
artikel
64 Flexible adversary disclosure risk measure for identity and attribute disclosure attacks Orooji, Marmar

3 p. 631-645
artikel
65 FOTB: a secure blockchain-based firmware update framework for IoT environment Yohan, Alexander

3 p. 257-278
artikel
66 Generalized XML security views Kuper, Gabriel
2008
3 p. 173-203
artikel
67 Generalizing cryptosystems based on the subset sum problem Kate, Aniket
2011
3 p. 189-199
artikel
68 Gossamer: weaknesses and performance D’Arco, P.

3 p. 669-687
artikel
69 GPU-assisted malware Vasiliadis, Giorgos
2014
3 p. 289-297
artikel
70 IDSIC: an intrusion detection system with identification capability Chen, Pei-Te
2007
3 p. 185-197
artikel
71 Improving cache attacks by considering cipher structure Tsunoo, Yukiyasu
2006
3 p. 166-176
artikel
72 Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology Singh, Jaya

3 p. 527-546
artikel
73 Intelligent and behavioral-based detection of malware in IoT spectrum sensors Celdrán, Alberto Huertas

3 p. 541-561
artikel
74 Intrusion detection in voice over IP environments Wu, Yu-Sung
2008
3 p. 153-172
artikel
75 Keeping secrets in incomplete databases Biskup, Joachim
2007
3 p. 199-217
artikel
76 Key recovery for the commercial environment Gonzáles Nieto, J.M.
2002
3 p. 161-174
artikel
77 Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter Vora, Aishwarya Vipul
2018
3 p. 305-319
artikel
78 Lattice-based deniable ring signatures Gao, Wen
2018
3 p. 355-370
artikel
79 Linkable message tagging: solving the key distribution problem of signature schemes Günther, Felix
2016
3 p. 281-297
artikel
80 Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity Bao, Zijian

3 p. 311-321
artikel
81 Maintaining the level of operational effectiveness of a CSOC under adverse conditions Shah, Ankit

3 p. 637-651
artikel
82 Making random permutations from physically unclonable constants Bernardini, Riccardo
2016
3 p. 249-261
artikel
83 MalFamAware: automatic family identification and malware classification through online clustering Pitolli, Gregorio

3 p. 371-386
artikel
84 MobileTrust: a trust enhanced security architecture for mobile agent systems Lin, Ching
2009
3 p. 153-178
artikel
85 Multi-cloud applications: data and code fragmentation for improved security Lovrenčić, Rudolf

3 p. 713-721
artikel
86 Multi-Keyword search over encrypted data with scoring and search pattern obfuscation Orencik, Cengiz
2015
3 p. 251-269
artikel
87 Narrow privacy and desynchronization in Vaudenay’s RFID model Ţiplea, Ferucio Laurenţiu

3 p. 563-575
artikel
88 Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud Alghamdi, Saleh A.

3 p. 469-488
artikel
89 Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS) Bandara, Eranga

3 p. 591-609
artikel
90 Offline firewall analysis Mayer, Alain
2006
3 p. 125-144
artikel
91 OFMC: A symbolic model checker for security protocols Basin, David
2004
3 p. 181-208
artikel
92 On practical privacy-preserving fault-tolerant data aggregation Grining, Krzysztof
2018
3 p. 285-304
artikel
93 On the insecurity of quantum Bitcoin mining Sattath, Or

3 p. 291-302
artikel
94 Optimal security hardening on attack tree models of networks: a cost-benefit analysis Dewri, Rinku
2012
3 p. 167-188
artikel
95 Outsourced pattern matching Faust, Sebastian
2017
3 p. 327-346
artikel
96 Passive-attack analysis for connection-based anonymity systems Serjantov, Andrei
2005
3 p. 172-180
artikel
97 PolicyUpdater: a system for dynamic access control Crescini, Vino Fernando
2006
3 p. 145-165
artikel
98 Pragmatic authenticated key agreement for IEEE Std 802.15.6 Khan, Haibat

3 p. 577-595
artikel
99 Preface to the special issue on ESORICS 2003 Snekkenes, Einar
2004
3 p. 133-134
artikel
100 Privacy in targeted advertising on mobile devices: a survey Ullah, Imdad

3 p. 647-678
artikel
101 Proposal on personal identifiers generated from the STR information of DNA Itakura, Yukio
2002
3 p. 149-160
artikel
102 Provably secure E-cash system with practical and efficient complete tracing Lian, Bin
2014
3 p. 271-289
artikel
103 Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection Al-Shehari, Taher

3 p. 611-629
artikel
104 Risk balance defense approach against intrusions for network server Mu, Chengpo
2013
3 p. 255-269
artikel
105 Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks Fan, Chun-I

3 p. 245-255
artikel
106 Secure localization with attack detection in wireless sensor networks Zhu, Wen Tao
2011
3 p. 155-171
artikel
107 Secure pattern matching based on bit parallelism Samadani, Mohammad Hasan
2018
3 p. 371-391
artikel
108 Secure universal designated verifier signature without random oracles Huang, Xinyi
2007
3 p. 171-183
artikel
109 Security analysis of CRT-based cryptosystems Okeya, Katsuyuki
2006
3 p. 177-185
artikel
110 Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures Spence, Aaron

3 p. 437-453
artikel
111 Selecting parameters for secure McEliece-based cryptosystems Niebuhr, Robert
2012
3 p. 137-147
artikel
112 Shoulder-surfing-proof graphical password authentication scheme Wu, Tzong-Sun
2013
3 p. 245-254
artikel
113 Special issue on security and privacy of blockchain technologies Yeh, Kuo-Hui

3 p. 243-244
artikel
114 Stealing PINs via mobile sensors: actual risk versus user perception Mehrnezhad, Maryam
2017
3 p. 291-313
artikel
115 Symmetric authentication in a simulatable Dolev–Yao-style cryptographic library Backes, Michael
2004
3 p. 135-154
artikel
116 Systematic review of SIEM technology: SIEM-SC birth López Velásquez, Juan Miguel

3 p. 691-711
artikel
117 Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality Kurek, Tytus
2015
3 p. 235-250
artikel
118 Techniques for improving the security and manageability of IPsec policy Trostle, Jonathan
2005
3 p. 209-226
artikel
119 The parazoa family: generalizing the sponge hash functions Andreeva, Elena
2012
3 p. 149-165
artikel
120 Threshold privacy-preserving cloud auditing with multiple uploaders Wu, Ge
2018
3 p. 321-331
artikel
121 Toward a secure Kerberos key exchange with smart cards Mavrogiannopoulos, Nikos
2013
3 p. 217-228
artikel
122 Tracking adoption of revocation and cryptographic features in X.509 certificates Zulfiqar, Maryam

3 p. 653-668
artikel
123 Understanding trust in privacy-aware video surveillance systems Rashwan, Hatem A.
2015
3 p. 225-234
artikel
124 User-friendly and certificate-free grid security infrastructure Crampton, Jason
2011
3 p. 137-153
artikel
125 Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts Spathoulas, Georgios

3 p. 347-370
artikel
126 Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management Wang, Yujue
2017
3 p. 347-363
artikel
127 Visualization-based policy analysis for SELinux: framework and user study Xu, Wenjuan
2012
3 p. 155-171
artikel
                             127 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland