Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             123 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accessible password strength assessment method for visually challenged users Kuppusamy, K. S.

6 p. 1731-1741
artikel
2 Achieving evenhandedness in certified email system for contract signing Imamoto, Kenji
2008
6 p. 383-394
artikel
3 A conceptual model of security context Jovanovikj, Vladimir
2014
6 p. 571-581
artikel
4 A context-aware robust intrusion detection system: a reinforcement learning-based approach Sethi, Kamalakanta

6 p. 657-678
artikel
5 A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network Pérez-Méndez, Alejandro
2012
6 p. 365-388
artikel
6 A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock Ibrahim, Nasir

6 p. 1849-1863
artikel
7 Adaptive hyperparameter optimization for black-box adversarial attack Guan, Zhenyu

6 p. 1765-1779
artikel
8 A decentralized honeypot for IoT Protocols based on Android devices Lygerou, Irini

6 p. 1211-1222
artikel
9 Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques López, Christian

6 p. 1665-1685
artikel
10 A framework for estimating information security risk assessment method completeness Wangen, Gaute
2017
6 p. 681-699
artikel
11 After you, please: browser extensions order attacks and countermeasures Picazo-Sanchez, Pablo

6 p. 623-638
artikel
12 A generalization of Paillier’s public-key system with applications to electronic voting Damgård, Ivan
2010
6 p. 371-385
artikel
13 Aggregate message authentication codes (AMACs) with on-the-fly verification Chen, Yu-Shian
2013
6 p. 495-504
artikel
14 A language and a pattern system for temporal property specification: advanced metering infrastructure case study Tavizi, Tina

6 p. 695-710
artikel
15 A method for identifying Web applications Kozina, Mario
2009
6 p. 455-467
artikel
16 Analyzing proposals for improving authentication on the TLS-/SSL-protected Web Brown, Christopher W.
2016
6 p. 621-635
artikel
17 An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks Esfahani, Alireza
2016
6 p. 627-639
artikel
18 An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM Prajisha, C.

6 p. 1263-1282
artikel
19 Anonymity guarantees of the UMTS/LTE authentication and connection protocol Lee, Ming-Feng
2014
6 p. 513-527
artikel
20 A note on the Ate pairing Zhao, Chang-An
2008
6 p. 379-382
artikel
21 A personalized learning theory-based cyber-security training exercise Chowdhury, Nabin

6 p. 1531-1546
artikel
22 A quantitative framework for security assurance evaluation and selection of cloud services: a case study Shukla, Ankur

6 p. 1621-1650
artikel
23 Are chrome extensions compliant with the spirit of least privilege? Picazo-Sanchez, Pablo

6 p. 1283-1297
artikel
24 A security protocol for D2D communications in 5G networks using elliptic curve cryptography Kishore, R.

6 p. 1389-1408
artikel
25 A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media Kumar, Raju

6 p. 1409-1431
artikel
26 A survey of anomaly detection methods for power grids Madabhushi, Srinidhi

6 p. 1799-1832
artikel
27 A systematic overview on methods to protect sensitive data provided for various analyses Templ, Matthias

6 p. 1233-1246
artikel
28 A systematic review of privacy techniques in recommendation systems Ogunseyi, Taiwo Blessing

6 p. 1651-1664
artikel
29 A technical characterization of APTs by leveraging public resources González-Manzano, Lorena

6 p. 1567-1584
artikel
30 Attention: there is an inconsistency between android permissions and application metadata! Alecakir, Huseyin

6 p. 797-815
artikel
31 Attribute disclosure risk for k-anonymity: the case of numerical data Torra, Vicenç

6 p. 2015-2024
artikel
32 BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks Luong, Ngoc T.

6 p. 1547-1566
artikel
33 Biometric keys: suitable use cases and achievable information content Plaga, Rainer
2009
6 p. 447-454
artikel
34 Breaking four mix-related schemes based on Universal Re-encryption Danezis, George
2007
6 p. 393-402
artikel
35 CADS-ML/DL: efficient cloud-based multi-attack detection system Farhat, Saida

6 p. 1989-2013
artikel
36 Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols Bindel, Nina
2017
6 p. 701-718
artikel
37 Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys Yankson, Benjamin

6 p. 849-869
artikel
38 COVERAGE: detecting and reacting to worm epidemics using cooperation and validation Anagnostakis, Kostas G.
2007
6 p. 361-378
artikel
39 Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks Miret, Josep M.
2011
6 p. 387-389
artikel
40 CT-GCN: a phishing identification model for blockchain cryptocurrency transactions Fu, Bingxue

6 p. 1223-1232
artikel
41 Data minimisation in communication protocols: a formal analysis framework and application to identity management Veeningen, Meilof
2014
6 p. 529-569
artikel
42 DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation Aamir, Muhammad
2019
6 p. 761-785
artikel
43 Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications Kifouche, Abdenour

6 p. 1247-1262
artikel
44 Development of dynamic protection against timing channels Kananizadeh, Shahrzad
2016
6 p. 641-651
artikel
45 DFTMicroagg: a dual-level anonymization algorithm for smart grid data Adewole, Kayode S.

6 p. 1299-1321
artikel
46 DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour Žiža, Kristijan

6 p. 1865-1880
artikel
47 DomainProfiler: toward accurate and early discovery of domain names abused in future Chiba, Daiki
2017
6 p. 661-680
artikel
48 DOMtegrity: ensuring web page integrity against malicious browser extensions Toreini, Ehsan
2019
6 p. 801-814
artikel
49 Effective network intrusion detection using stacking-based ensemble approach Ali, Muhammad

6 p. 1781-1798
artikel
50 Efficient strong designated verifier signature schemes without random oracle or with non-delegatability Huang, Qiong
2011
6 p. 373-385
artikel
51 Efficient trace and revoke schemes Naor, Moni
2010
6 p. 411-424
artikel
52 Electronic retention: what does your mobile phone reveal about you? Glisson, William Bradley
2011
6 p. 337-349
artikel
53 Enabling isolation and recovery in PLC redundancy framework of metro train systems Josephlal, Edwin Franco Myloth

6 p. 783-795
artikel
54 Encouraging users to improve password security and memorability Yıldırım, M.
2019
6 p. 741-759
artikel
55 Erratum to: Dynamic subtree tracing and its application in pay-TV systems Roelse, Peter
2011
6 p. 391
artikel
56 Evading malware classifiers using RL agent with action-mask Pandey, Saurabh

6 p. 1743-1763
artikel
57 Extending .NET security to unmanaged code Klinkoff, Patrick
2007
6 p. 417-428
artikel
58 Fast but approximate homomorphic k-means based on masking technique Rovida, Lorenzo

6 p. 1605-1619
artikel
59 FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices Zhang, Yanting

6 p. 639-656
artikel
60 Federated learning-based intrusion detection system for Internet of Things Hamdi, Najet

6 p. 1937-1948
artikel
61 File Guard: automatic format-based media file sanitization Zhang, Tao
2019
6 p. 701-713
artikel
62 Flexible attribute-based encryption applicable to secure e-healthcare records Qin, Bo
2015
6 p. 499-511
artikel
63 Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs Hammer, Christian
2009
6 p. 399-422
artikel
64 From scattered data to actionable knowledge: flexible cyber security reporting in the military domain Skopik, Florian

6 p. 1323-1347
artikel
65 Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme Hoang, Thang
2015
6 p. 549-560
artikel
66 High-performance secure multi-party computation for data mining applications Bogdanov, Dan
2012
6 p. 403-418
artikel
67 Hydras and IPFS: a decentralised playground for malware Patsakis, Constantinos
2019
6 p. 787-799
artikel
68 Improving the ISO/IEC 11770 standard for key management techniques Cremers, Cas
2015
6 p. 659-673
artikel
69 Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks Bononi, Luciano
2007
6 p. 379-392
artikel
70 Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review Kaur, Sarabjeet

6 p. 1949-1988
artikel
71 KAMU: providing advanced user privacy in Kerberos multi-domain scenarios Pereñíguez-García, F.
2013
6 p. 505-525
artikel
72 LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment Abdussami, Mohammad

6 p. 1373-1387
artikel
73 Leveraging cyber threat intelligence for a dynamic risk framework Riesco, R.
2019
6 p. 715-739
artikel
74 Lightweight multi-factor mutual authentication protocol for IoT devices Melki, Reem

6 p. 679-694
artikel
75 Malware classification approaches utilizing binary and text encoding of permissions Zyout, Mo’ath

6 p. 1687-1712
artikel
76 Measuring protocol strength with security goals Rowe, Paul D.
2016
6 p. 575-596
artikel
77 Message from the guest editors Chen, Liqun
2016
6 p. 573-574
artikel
78 New constructions of OSBE schemes and their applications in oblivious access control Han, Jinguang
2012
6 p. 389-401
artikel
79 Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results Bresson, Emmanuel
2013
6 p. 439-465
artikel
80 OnionDNS: a seizure-resistant top-level domain Scaife, Nolen
2017
6 p. 645-660
artikel
81 On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs Smiliotopoulos, Christos

6 p. 1893-1919
artikel
82 On the efficiency of user identification: a system-based approach Malatras, Apostolos
2016
6 p. 653-671
artikel
83 Opacity generalised to transition systems Bryans, Jeremy W.
2008
6 p. 421-435
artikel
84 Optimal noise functions for location privacy on continuous regions ElSalamouny, Ehab
2017
6 p. 613-630
artikel
85 Optimization algorithm for k-anonymization of datasets with low information loss Murakami, Keisuke
2017
6 p. 631-644
artikel
86 Outsourced cheating detection for secret sharing Cianciullo, Louis

6 p. 871-878
artikel
87 Password-authenticated key exchange based on RSA MacKenzie, Philip
2010
6 p. 387-410
artikel
88 Periodicity in software vulnerability discovery, patching and exploitation Joh, HyunChul
2016
6 p. 673-690
artikel
89 Preface Backes, Michael
2007
6 p. 359-360
artikel
90 Privacy-preserving authentication of trees and graphs Kundu, Ashish
2013
6 p. 467-494
artikel
91 Privacy-preserving continuous authentication using behavioral biometrics Baig, Ahmed Fraz

6 p. 1833-1847
artikel
92 Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation Qian, Huiling
2014
6 p. 487-497
artikel
93 Protecting data privacy through hard-to-reverse negative databases Esponda, Fernando
2007
6 p. 403-415
artikel
94 PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization Torra, Vicenç

6 p. 1349-1359
artikel
95 Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation Sun, Lixue

6 p. 711-720
artikel
96 RADS: a real-time anomaly detection model for software-defined networks using machine learning Sneha, M.

6 p. 1881-1891
artikel
97 rPIR: ramp secret sharing-based communication-efficient private information retrieval Li, Lichun
2016
6 p. 603-625
artikel
98 Secure and efficient anonymization of distributed confidential databases Herranz, Javier
2014
6 p. 497-512
artikel
99 Secure and trusted partial grey-box verification Cai, Yixian
2019
6 p. 677-700
artikel
100 Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model Aliasgari, Mehrdad
2016
6 p. 577-601
artikel
101 Secure floating point arithmetic and private satellite collision analysis Kamm, Liina
2014
6 p. 531-548
artikel
102 Secure modular password authentication for the web using channel bindings Manulis, Mark
2016
6 p. 597-620
artikel
103 Secure steganography based on embedding capacity Sajedi, Hedieh
2009
6 p. 433-445
artikel
104 Securing the controller area network with covert voltage channels Murvay, Pal-Stefan

6 p. 817-831
artikel
105 Security analysis and improvement of a privacy-preserving authentication scheme in VANET Yang, Xiaodong

6 p. 1361-1371
artikel
106 Security and privacy of electronic health information systems Bertino, Elisa
2015
6 p. 485-486
artikel
107 Security and searchability in secret sharing-based data outsourcing Hadavi, Mohammad Ali
2015
6 p. 513-529
artikel
108 Solving identity delegation problem in the e-government environment Sánchez García, Sergio
2011
6 p. 351-372
artikel
109 Specifying and implementing privacy-preserving cryptographic protocols Balopoulos, Theodoros
2008
6 p. 395-420
artikel
110 Talos: no more ransomware victims with formal methods Cimitile, Aniello
2017
6 p. 719-738
artikel
111 The suffix-free-prefix-free hash function construction and its indifferentiability security analysis Bagheri, Nasour
2012
6 p. 419-434
artikel
112 Thresholdizing HashEdDSA: MPC to the Rescue Bonte, Charlotte

6 p. 879-894
artikel
113 Token-based graphical password authentication Gyorffy, John Charles
2011
6 p. 321-336
artikel
114 Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system Barhoun, Rabie

6 p. 1585-1604
artikel
115 Two-model active learning approach for inappropriate information classification in social networks Levshun, Dmitry

6 p. 1921-1936
artikel
116 Uncertain inference control in privacy protection An, Xiangdong
2009
6 p. 423-431
artikel
117 Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol Degabriele, Jean Paul
2016
6 p. 637-657
artikel
118 URL query string anomaly sensor designed with the bidimensional Haar wavelet transform Kozakevicius, Alice
2015
6 p. 561-581
artikel
119 User interface design affects security: patterns in click-based graphical passwords Chiasson, Sonia
2009
6 p. 387-398
artikel
120 User-mediated authentication protocols and unforgeability in key collision Hale, Britta

6 p. 609-621
artikel
121 Using instance-weighted naive Bayes for adapting concept drift in masquerade detection Sen, Sevil
2014
6 p. 583-590
artikel
122 Web access monitoring mechanism via Android WebView for threat analysis Imamura, Yuta

6 p. 833-847
artikel
123 Yet another cybersecurity risk assessment framework Ekstedt, Mathias

6 p. 1713-1729
artikel
                             123 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland