


default search action
International Journal of Information Security, Volume 18
Volume 18, Number 1, February 2019
- Debasish Das, Utpal Sharma, D. K. Bhattacharyya
:
Defeating SQL injection attack in authentication security: an experimental study. 1-22 - Dipankar Dasgupta
, Abhijit Kumar Nag, Denise Ferebee, Sanjib Kumar Saha, Kul Prasad Subedi, Arunava Roy, Alvaro Madero, Abel Sanchez, John R. Williams:
Design and implementation of Negative Authentication System. 23-48 - Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis
:
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications. 49-72 - Gerson de Souza Faria
, Hae Yong Kim
:
Differential audio analysis: a new side-channel attack on PIN pads. 73-84 - Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM. 85-100 - M. Francisca Hinarejos
, Andreu Pere Isern-Deyà
, Josep Lluís Ferrer-Gomila
, Llorenç Huguet i Rotger:
Deployment and performance evaluation of mobile multicoupon solutions. 101-124
Volume 18, Number 2, April 2019
- Gábor György Gulyás, Sándor Imre
:
Hiding information against structural re-identification. 125-139 - Jian-Wu Zheng, Jing Zhao, Xin-Ping Guan:
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy. 141-162 - Donghoon Chang, Arpan Jati, Sweta Mishra
, Somitra Kumar Sanadhya
:
Cryptanalytic time-memory trade-off for password hashing schemes. 163-180 - Kamil Kluczniak
, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device anonymous authentication. 181-197 - Ankit Shah, Rajesh Ganesan, Sushil Jajodia
:
A methodology for ensuring fair allocation of CSOC effort for alert investigation. 199-218 - Miguel Ros-Martín, Julián Salas, Jordi Casas-Roma
:
Scalable non-deterministic clustering-based k-anonymization for rich networks. 219-238 - Zeinab Joudaki, Julie Thorpe
, Miguel Vargas Martin:
Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to. 239-255
Volume 18, Number 3, June 2019
- Mario Luca Bernardi
, Marta Cimitile
, Damiano Distante
, Fabio Martinelli, Francesco Mercaldo:
Dynamic malware detection and phylogeny analysis using process mining. 257-284 - Krzysztof Grining, Marek Klonowski
, Piotr Syga
:
On practical privacy-preserving fault-tolerant data aggregation. 285-304 - Aishwarya Vipul Vora, Saumya Hegde
:
Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter. 305-319 - Ge Wu
, Yi Mu, Willy Susilo
, Fuchun Guo
, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. 321-331 - Benedikt Hiemenz, Michel Krämer
:
Dynamic searchable symmetric encryption for storing geospatial data in the cloud. 333-354 - Wen Gao, Liqun Chen
, Yupu Hu, Christopher J. P. Newton
, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. 355-370 - Mohammad Hasan Samadani, Mehdi Berenjkoub, Marina Blanton
:
Secure pattern matching based on bit parallelism - Non-interactive protocols for non-deterministic string matching automata evaluation. 371-391
Volume 18, Number 4, August 2019
- Yusuf Kulah, Berkay Dincer, Cemal Yilmaz
, Erkay Savas:
SpyDetector: An approach for detecting side-channel attacks at runtime. 393-422 - Mohammad Reza Faghani
, Uyen Trang Nguyen:
Mobile botnets meet social networks: design and analysis of a new type of botnet. 423-449 - Cristina Pérez-Solà
, Sergi Delgado-Segura
, Guillermo Navarro-Arribas
, Jordi Herrera-Joancomartí
:
Double-spending prevention for Bitcoin zero-confirmation transactions. 451-463 - Mohsen Rezvani
, David Rajaratnam
, Aleksandar Ignjatovic, Maurice Pagnucco
, Sanjay Jha
:
Analyzing XACML policies using answer set programming. 465-479 - Anil Saini, Manoj Singh Gaur, Vijay Laxmi
, Mauro Conti
:
You click, I steal: analyzing and detecting click hijacking attacks in web pages. 481-504 - João S. Resende
, Patrícia R. Sousa
, Rolando Martins
, Luis Antunes
:
Breaking MPC implementations through compression. 505-518 - Hector Marco-Gisbert
, Ismael Ripoll-Ripoll
:
SSPFA: effective stack smashing protection for Android OS. 519-532
Volume 18, Number 5, October 2019
- Oriol Farràs
, Jordi Ribes-González
:
Provably secure public-key encryption with conjunctive and subset keyword search. 533-548 - James Dyer
, Martin E. Dyer
, Jie Xu:
Practical homomorphic encryption over the integers for secure computation in the cloud. 549-579 - Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature schemes with a fuzzy private key. 581-617 - Parvin Rastegari, Willy Susilo
, Mohammad Dakhilalian
:
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model. 619-635 - Ricard Garra, Dominik Leibenger, Josep M. Miret, Francesc Sebé
:
Repairing an aggregation-based smart metering system. 637-646 - Xiaoying Yu, Qi Liao
:
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization. 647-663 - Amel Meddeb-Makhlouf
, Mohsen Guizani:
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications. 665-676
Volume 18, Number 6, December 2019
- Yixian Cai, George Karakostas
, Alan Wassyng:
Secure and trusted partial grey-box verification. 677-700 - Tao Zhang
, Lee Wang Hao, Mingyuan Gao, Jianying Zhou
:
File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation. 701-713 - Raúl Riesco
, Víctor A. Villagrá
:
Leveraging cyber threat intelligence for a dynamic risk framework - Automation by using a semantic reasoner and a new combination of standards (STIX™, SWRL and OWL). 715-739 - Merve Yildirim, Ian Mackie:
Encouraging users to improve password security and memorability. 741-759 - Muhammad Aamir, Syed Mustafa Ali Zaidi:
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. 761-785 - Constantinos Patsakis
, Fran Casino
:
Hydras and IPFS: a decentralised playground for malware. 787-799 - Ehsan Toreini
, Siamak F. Shahandashti, Maryam Mehrnezhad
, Feng Hao
:
DOMtegrity: ensuring web page integrity against malicious browser extensions. 801-814

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.