Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
11 |
Material Type: Artigo
|
Secure and efficient anonymization of distributed confidential databasesHerranz, Javier ; Nin, JordiInternational journal of information security, 2014-11, Vol.13 (6), p.497-512 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
12 |
Material Type: Artigo
|
Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal componentsAhmad, Iftikhar ; Hussain, Muhammad ; Alghamdi, Abdullah ; Alelaiwi, AbdulhameedNeural computing & applications, 2014-06, Vol.24 (7-8), p.1671-1682 [Periódico revisado por pares]London: Springer LondonTexto completo disponível |
|
13 |
Material Type: Artigo
|
Identity-based encryption from the weil pairingBONEH, Dan ; FRANKLIN, MatthewSIAM journal on computing, 2003-01, Vol.32 (3), p.586-615 [Periódico revisado por pares]Philadelphia, PA: Society for Industrial and Applied MathematicsTexto completo disponível |
|
14 |
Material Type: Artigo
|
Dissecting social engineeringTetri, Pekka ; Vuorinen, JukkaBehaviour & information technology, 2013-10, Vol.32 (10), p.1014-1023 [Periódico revisado por pares]Colchester: Taylor & FrancisTexto completo disponível |
|
15 |
Material Type: Artigo
|
Shoulder-surfing-proof graphical password authentication schemeWu, Tzong-Sun ; Lee, Ming-Lun ; Lin, Han-Yu ; Wang, Chao-YuanInternational journal of information security, 2014-06, Vol.13 (3), p.245-254 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
16 |
Material Type: Artigo
|
A defense framework against malware and vulnerability exploitsZhang, Meng ; Raghunathan, Anand ; Jha, Niraj K.International journal of information security, 2014-10, Vol.13 (5), p.439-452 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
17 |
Material Type: Artigo
|
Anonymity guarantees of the UMTS/LTE authentication and connection protocolLee, Ming-Feng ; Smart, Nigel P. ; Warinschi, Bogdan ; Watson, Gaven J.International journal of information security, 2014-11, Vol.13 (6), p.513-527 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
18 |
Material Type: Artigo
|
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertextsPhan, Duong-Hieu ; Pointcheval, David ; Shahandashti, Siamak F. ; Strefler, MarioInternational journal of information security, 2013-08, Vol.12 (4), p.251-265 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
19 |
Material Type: Artigo
|
Data minimisation in communication protocols: a formal analysis framework and application to identity managementVeeningen, Meilof ; de Weger, Benne ; Zannone, NicolaInternational journal of information security, 2014-11, Vol.13 (6), p.529-569 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
20 |
Material Type: Artigo
|
Privacy-preserving authentication of trees and graphsKundu, Ashish ; Bertino, ElisaInternational journal of information security, 2013-11, Vol.12 (6), p.467-494 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |