nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain
|
Ghorbel, Amal |
|
|
|
3 |
p. 489-508 |
artikel |
2 |
A certificateless approach to onion routing
|
Catalano, Dario |
|
2016 |
|
3 |
p. 327-343 |
artikel |
3 |
A content-based deep intrusion detection system
|
Soltani, Mahdi |
|
|
|
3 |
p. 547-562 |
artikel |
4 |
Active authentication for mobile devices utilising behaviour profiling
|
Li, Fudong |
|
2013 |
|
3 |
p. 229-244 |
artikel |
5 |
A delegation model for extended RBAC
|
Ben-Ghorbel-Talbi, Meriam |
|
2010 |
|
3 |
p. 209-236 |
artikel |
6 |
A key management scheme evaluation using Markov processes
|
Ragab-Hassen, Hani |
|
2016 |
|
3 |
p. 271-280 |
artikel |
7 |
All-or-Nothing Transforms as a countermeasure to differential side-channel analysis
|
McEvoy, Robert P. |
|
2013 |
|
3 |
p. 291-304 |
artikel |
8 |
A modified exhaustive search on a password system using SHA-1
|
Kim, Minchul |
|
2016 |
|
3 |
p. 263-269 |
artikel |
9 |
A monitoring system for detecting repeated packets with applications to computer worms
|
van Oorschot, Paul C. |
|
|
|
3 |
p. 186-199 |
artikel |
10 |
A monitoring system for detecting repeated packets with applications to computer worms
|
Oorschot, Paul C. van |
|
2006 |
|
3 |
p. 186-199 |
artikel |
11 |
Analysis of two authorization protocols using Colored Petri Nets
|
Seifi, Younes |
|
2014 |
|
3 |
p. 221-247 |
artikel |
12 |
Analyzing SLE 88 memory management security using Interacting State Machines
|
von Oheimb, David |
|
2005 |
|
3 |
p. 155-171 |
artikel |
13 |
A new algorithm for low-deterministic security
|
Giffhorn, Dennis |
|
2014 |
|
3 |
p. 263-287 |
artikel |
14 |
A new electronic check system with reusable refunds
|
Kim, S. |
|
2002 |
|
3 |
p. 175-188 |
artikel |
15 |
An improved FOO voting scheme using blockchain
|
Zhou, Yuanjian |
|
|
|
3 |
p. 303-310 |
artikel |
16 |
An intrusion detection and prevention system for IMS and VoIP services
|
Vrakas, Nikos |
|
2013 |
|
3 |
p. 201-217 |
artikel |
17 |
Anomalous behavior detection-based approach for authenticating smart home system users
|
Amraoui, Noureddine |
|
|
|
3 |
p. 611-636 |
artikel |
18 |
Anonymity in traceable cloud data broadcast system with simultaneous individual messaging
|
Mandal, Mriganka |
|
|
|
3 |
p. 405-430 |
artikel |
19 |
Anonymous attestation with user-controlled linkability
|
Bernhard, D. |
|
2013 |
|
3 |
p. 219-249 |
artikel |
20 |
Anonymous subject identification and privacy information management in video surveillance
|
Luo, Ying |
|
2017 |
|
3 |
p. 261-278 |
artikel |
21 |
A novel frame switching model based on virtual MAC in SDN
|
Song, Guangjia |
|
|
|
3 |
p. 723-736 |
artikel |
22 |
A novel scalable intrusion detection system based on deep learning
|
Mighan, Soosan Naderi |
|
|
|
3 |
p. 387-403 |
artikel |
23 |
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF
|
Aniello, Leonardo |
|
|
|
3 |
p. 445-460 |
artikel |
24 |
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
|
Das, Ashok Kumar |
|
2012 |
|
3 |
p. 189-211 |
artikel |
25 |
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces
|
Zhang, Lu |
|
|
|
3 |
p. 509-525 |
artikel |
26 |
Attacking a polynomial-based cryptosystem: Polly Cracker
|
Steinwandt, Rainer |
|
2002 |
|
3 |
p. 143-148 |
artikel |
27 |
Automated inference of past action instances in digital investigations
|
James, Joshua I. |
|
2014 |
|
3 |
p. 249-261 |
artikel |
28 |
A wrinkle in time: a case study in DNS poisoning
|
Berger, Harel |
|
|
|
3 |
p. 313-329 |
artikel |
29 |
Broadcast anonymous routing (BAR): scalable real-time anonymous communication
|
Kotzanikolaou, Panayiotis |
|
2016 |
|
3 |
p. 313-326 |
artikel |
30 |
Broadcast encryption with dealership
|
Gritti, Clémentine |
|
2015 |
|
3 |
p. 271-283 |
artikel |
31 |
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability
|
Zhang, Shufan |
|
|
|
3 |
p. 323-341 |
artikel |
32 |
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN
|
Benarfa, Abdelmadjid |
|
|
|
3 |
p. 269-285 |
artikel |
33 |
Compliant cryptologic protocols
|
Dawson, Ed |
|
2002 |
|
3 |
p. 189-202 |
artikel |
34 |
Cyber insurance: state of the art, trends and future directions
|
Tsohou, Aggeliki |
|
|
|
3 |
p. 737-748 |
artikel |
35 |
Cyber–physical risk assessment for false data injection attacks considering moving target defences
|
Higgins, Martin |
|
|
|
3 |
p. 579-589 |
artikel |
36 |
Cyber security in New Space
|
Manulis, M. |
|
|
|
3 |
p. 287-311 |
artikel |
37 |
Database intrusion detection using sequence alignment
|
Kundu, Amlan |
|
2010 |
|
3 |
p. 179-191 |
artikel |
38 |
Data space randomization for securing cyber-physical systems
|
Potteiger, Bradley |
|
|
|
3 |
p. 597-610 |
artikel |
39 |
Defeating traffic analysis via differential privacy: a case study on streaming traffic
|
Zhang, Xiaokuan |
|
|
|
3 |
p. 689-706 |
artikel |
40 |
Definition of an advanced identity management infrastructure
|
Dólera Tormo, Ginés |
|
2012 |
|
3 |
p. 173-200 |
artikel |
41 |
Dependency-based security risk assessment for cyber-physical systems
|
Akbarzadeh, Aida |
|
|
|
3 |
p. 563-578 |
artikel |
42 |
Design and implementation of a secure and trustworthy platform for privacy-aware video surveillance
|
Martínez-Ballesté, Antoni |
|
2017 |
|
3 |
p. 279-290 |
artikel |
43 |
Detection and analysis of eavesdropping in anonymous communication networks
|
Chakravarty, Sambuddho |
|
2014 |
|
3 |
p. 205-220 |
artikel |
44 |
Detection of firewall configuration errors with updatable tree
|
Abbes, Tarek |
|
2015 |
|
3 |
p. 301-317 |
artikel |
45 |
Distributed star coloring of network for IP traceback
|
Roy, Sangita |
|
2017 |
|
3 |
p. 315-326 |
artikel |
46 |
Dynamic group size accreditation and group discounts preserving anonymity
|
Domingo-Ferrer, Josep |
|
2017 |
|
3 |
p. 243-260 |
artikel |
47 |
Dynamic malware detection and phylogeny analysis using process mining
|
Bernardi, Mario Luca |
|
2018 |
|
3 |
p. 257-284 |
artikel |
48 |
Dynamic searchable symmetric encryption for storing geospatial data in the cloud
|
Hiemenz, Benedikt |
|
2018 |
|
3 |
p. 333-354 |
artikel |
49 |
Dynamic subtree tracing and its application in pay-TV systems
|
Roelse, Peter |
|
2011 |
|
3 |
p. 173-187 |
artikel |
50 |
Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems
|
Salini, P. |
|
2015 |
|
3 |
p. 319-334 |
artikel |
51 |
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment
|
Chen, Yingchun |
|
|
|
3 |
p. 679-689 |
artikel |
52 |
Efficient attribute-based encryption with repeated attributes optimization
|
Khan, Fawad |
|
|
|
3 |
p. 431-444 |
artikel |
53 |
Efficient identity-based GQ multisignatures
|
Harn, Lein |
|
2008 |
|
3 |
p. 205-210 |
artikel |
54 |
Efficient identity-based online/offline encryption and signcryption with short ciphertext
|
Lai, Jianchang |
|
2016 |
|
3 |
p. 299-311 |
artikel |
55 |
Efficient parallelizable hashing using small non-compressing primitives
|
Mennink, Bart |
|
2015 |
|
3 |
p. 285-300 |
artikel |
56 |
Elastic block ciphers: method, security and instantiations
|
Cook, Debra L. |
|
2008 |
|
3 |
p. 211-231 |
artikel |
57 |
Embedding renewable cryptographic keys into noisy data
|
Buhan, Ileana |
|
2010 |
|
3 |
p. 193-208 |
artikel |
58 |
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
|
Meng, Weizhi |
|
|
|
3 |
p. 279-290 |
artikel |
59 |
Entropy analysis to classify unknown packing algorithms for malware detection
|
Bat-Erdene, Munkhbayar |
|
2016 |
|
3 |
p. 227-248 |
artikel |
60 |
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture
|
Bhattacharjya, Sairath |
|
|
|
3 |
p. 427-436 |
artikel |
61 |
Estimating the maximum information leakage
|
Aldini, Alessandro |
|
2007 |
|
3 |
p. 219-242 |
artikel |
62 |
Evaluating differentially private decision tree model over model inversion attack
|
Park, Cheolhee |
|
|
|
3 |
p. 1-14 |
artikel |
63 |
Evaluating visualization approaches to detect abnormal activities in network traffic data
|
Ji, Soo-Yeon |
|
|
|
3 |
p. 331-345 |
artikel |
64 |
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks
|
Orooji, Marmar |
|
|
|
3 |
p. 631-645 |
artikel |
65 |
FOTB: a secure blockchain-based firmware update framework for IoT environment
|
Yohan, Alexander |
|
|
|
3 |
p. 257-278 |
artikel |
66 |
Generalized XML security views
|
Kuper, Gabriel |
|
2008 |
|
3 |
p. 173-203 |
artikel |
67 |
Generalizing cryptosystems based on the subset sum problem
|
Kate, Aniket |
|
2011 |
|
3 |
p. 189-199 |
artikel |
68 |
Gossamer: weaknesses and performance
|
D’Arco, P. |
|
|
|
3 |
p. 669-687 |
artikel |
69 |
GPU-assisted malware
|
Vasiliadis, Giorgos |
|
2014 |
|
3 |
p. 289-297 |
artikel |
70 |
IDSIC: an intrusion detection system with identification capability
|
Chen, Pei-Te |
|
2007 |
|
3 |
p. 185-197 |
artikel |
71 |
Improving cache attacks by considering cipher structure
|
Tsunoo, Yukiyasu |
|
2006 |
|
3 |
p. 166-176 |
artikel |
72 |
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology
|
Singh, Jaya |
|
|
|
3 |
p. 527-546 |
artikel |
73 |
Intelligent and behavioral-based detection of malware in IoT spectrum sensors
|
Celdrán, Alberto Huertas |
|
|
|
3 |
p. 541-561 |
artikel |
74 |
Intrusion detection in voice over IP environments
|
Wu, Yu-Sung |
|
2008 |
|
3 |
p. 153-172 |
artikel |
75 |
Keeping secrets in incomplete databases
|
Biskup, Joachim |
|
2007 |
|
3 |
p. 199-217 |
artikel |
76 |
Key recovery for the commercial environment
|
Gonzáles Nieto, J.M. |
|
2002 |
|
3 |
p. 161-174 |
artikel |
77 |
Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter
|
Vora, Aishwarya Vipul |
|
2018 |
|
3 |
p. 305-319 |
artikel |
78 |
Lattice-based deniable ring signatures
|
Gao, Wen |
|
2018 |
|
3 |
p. 355-370 |
artikel |
79 |
Linkable message tagging: solving the key distribution problem of signature schemes
|
Günther, Felix |
|
2016 |
|
3 |
p. 281-297 |
artikel |
80 |
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity
|
Bao, Zijian |
|
|
|
3 |
p. 311-321 |
artikel |
81 |
Maintaining the level of operational effectiveness of a CSOC under adverse conditions
|
Shah, Ankit |
|
|
|
3 |
p. 637-651 |
artikel |
82 |
Making random permutations from physically unclonable constants
|
Bernardini, Riccardo |
|
2016 |
|
3 |
p. 249-261 |
artikel |
83 |
MalFamAware: automatic family identification and malware classification through online clustering
|
Pitolli, Gregorio |
|
|
|
3 |
p. 371-386 |
artikel |
84 |
MobileTrust: a trust enhanced security architecture for mobile agent systems
|
Lin, Ching |
|
2009 |
|
3 |
p. 153-178 |
artikel |
85 |
Multi-cloud applications: data and code fragmentation for improved security
|
Lovrenčić, Rudolf |
|
|
|
3 |
p. 713-721 |
artikel |
86 |
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
|
Orencik, Cengiz |
|
2015 |
|
3 |
p. 251-269 |
artikel |
87 |
Narrow privacy and desynchronization in Vaudenay’s RFID model
|
Ţiplea, Ferucio Laurenţiu |
|
|
|
3 |
p. 563-575 |
artikel |
88 |
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
|
Alghamdi, Saleh A. |
|
|
|
3 |
p. 469-488 |
artikel |
89 |
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)
|
Bandara, Eranga |
|
|
|
3 |
p. 591-609 |
artikel |
90 |
Offline firewall analysis
|
Mayer, Alain |
|
2006 |
|
3 |
p. 125-144 |
artikel |
91 |
OFMC: A symbolic model checker for security protocols
|
Basin, David |
|
2004 |
|
3 |
p. 181-208 |
artikel |
92 |
On practical privacy-preserving fault-tolerant data aggregation
|
Grining, Krzysztof |
|
2018 |
|
3 |
p. 285-304 |
artikel |
93 |
On the insecurity of quantum Bitcoin mining
|
Sattath, Or |
|
|
|
3 |
p. 291-302 |
artikel |
94 |
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
|
Dewri, Rinku |
|
2012 |
|
3 |
p. 167-188 |
artikel |
95 |
Outsourced pattern matching
|
Faust, Sebastian |
|
2017 |
|
3 |
p. 327-346 |
artikel |
96 |
Passive-attack analysis for connection-based anonymity systems
|
Serjantov, Andrei |
|
2005 |
|
3 |
p. 172-180 |
artikel |
97 |
PolicyUpdater: a system for dynamic access control
|
Crescini, Vino Fernando |
|
2006 |
|
3 |
p. 145-165 |
artikel |
98 |
Pragmatic authenticated key agreement for IEEE Std 802.15.6
|
Khan, Haibat |
|
|
|
3 |
p. 577-595 |
artikel |
99 |
Preface to the special issue on ESORICS 2003
|
Snekkenes, Einar |
|
2004 |
|
3 |
p. 133-134 |
artikel |
100 |
Privacy in targeted advertising on mobile devices: a survey
|
Ullah, Imdad |
|
|
|
3 |
p. 647-678 |
artikel |
101 |
Proposal on personal identifiers generated from the STR information of DNA
|
Itakura, Yukio |
|
2002 |
|
3 |
p. 149-160 |
artikel |
102 |
Provably secure E-cash system with practical and efficient complete tracing
|
Lian, Bin |
|
2014 |
|
3 |
p. 271-289 |
artikel |
103 |
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection
|
Al-Shehari, Taher |
|
|
|
3 |
p. 611-629 |
artikel |
104 |
Risk balance defense approach against intrusions for network server
|
Mu, Chengpo |
|
2013 |
|
3 |
p. 255-269 |
artikel |
105 |
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
|
Fan, Chun-I |
|
|
|
3 |
p. 245-255 |
artikel |
106 |
Secure localization with attack detection in wireless sensor networks
|
Zhu, Wen Tao |
|
2011 |
|
3 |
p. 155-171 |
artikel |
107 |
Secure pattern matching based on bit parallelism
|
Samadani, Mohammad Hasan |
|
2018 |
|
3 |
p. 371-391 |
artikel |
108 |
Secure universal designated verifier signature without random oracles
|
Huang, Xinyi |
|
2007 |
|
3 |
p. 171-183 |
artikel |
109 |
Security analysis of CRT-based cryptosystems
|
Okeya, Katsuyuki |
|
2006 |
|
3 |
p. 177-185 |
artikel |
110 |
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
|
Spence, Aaron |
|
|
|
3 |
p. 437-453 |
artikel |
111 |
Selecting parameters for secure McEliece-based cryptosystems
|
Niebuhr, Robert |
|
2012 |
|
3 |
p. 137-147 |
artikel |
112 |
Shoulder-surfing-proof graphical password authentication scheme
|
Wu, Tzong-Sun |
|
2013 |
|
3 |
p. 245-254 |
artikel |
113 |
Special issue on security and privacy of blockchain technologies
|
Yeh, Kuo-Hui |
|
|
|
3 |
p. 243-244 |
artikel |
114 |
Stealing PINs via mobile sensors: actual risk versus user perception
|
Mehrnezhad, Maryam |
|
2017 |
|
3 |
p. 291-313 |
artikel |
115 |
Symmetric authentication in a simulatable Dolev–Yao-style cryptographic library
|
Backes, Michael |
|
2004 |
|
3 |
p. 135-154 |
artikel |
116 |
Systematic review of SIEM technology: SIEM-SC birth
|
López Velásquez, Juan Miguel |
|
|
|
3 |
p. 691-711 |
artikel |
117 |
Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality
|
Kurek, Tytus |
|
2015 |
|
3 |
p. 235-250 |
artikel |
118 |
Techniques for improving the security and manageability of IPsec policy
|
Trostle, Jonathan |
|
2005 |
|
3 |
p. 209-226 |
artikel |
119 |
The parazoa family: generalizing the sponge hash functions
|
Andreeva, Elena |
|
2012 |
|
3 |
p. 149-165 |
artikel |
120 |
Threshold privacy-preserving cloud auditing with multiple uploaders
|
Wu, Ge |
|
2018 |
|
3 |
p. 321-331 |
artikel |
121 |
Toward a secure Kerberos key exchange with smart cards
|
Mavrogiannopoulos, Nikos |
|
2013 |
|
3 |
p. 217-228 |
artikel |
122 |
Tracking adoption of revocation and cryptographic features in X.509 certificates
|
Zulfiqar, Maryam |
|
|
|
3 |
p. 653-668 |
artikel |
123 |
Understanding trust in privacy-aware video surveillance systems
|
Rashwan, Hatem A. |
|
2015 |
|
3 |
p. 225-234 |
artikel |
124 |
User-friendly and certificate-free grid security infrastructure
|
Crampton, Jason |
|
2011 |
|
3 |
p. 137-153 |
artikel |
125 |
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
|
Spathoulas, Georgios |
|
|
|
3 |
p. 347-370 |
artikel |
126 |
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management
|
Wang, Yujue |
|
2017 |
|
3 |
p. 347-363 |
artikel |
127 |
Visualization-based policy analysis for SELinux: framework and user study
|
Xu, Wenjuan |
|
2012 |
|
3 |
p. 155-171 |
artikel |