The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation. Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: watermarking, software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility.
《国际信息安全杂志》是一份关于信息安全研究的英语期刊,提供重要技术工作的及时出版,无论是理论性的、适用性的还是与实施有关的。服务范围包括系统安全性:入侵检测、安全终端系统、安全操作系统、数据库安全、安全基础设施、安全评估;网络安全:互联网安全、防火墙、移动的安全、安全代理、协议、防病毒和防黑客措施;内容保护:水印、软件保护、防篡改软件;应用领域:电子商务、政府、健康、电信、移动性。
Hydras and IPFS: a decentralised playground for malware
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00443-0
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00464-9
SonarSnoop: active acoustic side-channel attacks
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00449-8
A novel graph-based approach for IoT botnet detection
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00475-6
A study of IoT malware activities using association rule learning for darknet sensor data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00439-w
Secure implementations of a random bisection cut
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00463-w
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00437-y
Encouraging users to improve password security and memorability
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00429-y
Provably secure public-key encryption with conjunctive and subset keyword search
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-018-00426-7
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00434-1
The IoT security gap: a look down into the valley between threat models and their implementation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00445-y
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00465-8
An improved FOO voting scheme using blockchain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00457-8
Signature schemes with a fuzzy private key
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00428-z
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00456-9
Lightweight multi-factor mutual authentication protocol for IoT devices
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00484-5
Protection against reverse engineering in ARM
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00450-1
DroidRista: a highly precise static data flow analysis framework for android applications
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00471-w
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00430-5
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00462-x
Attacks on smart grid: power supply interruption and malicious power generation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00452-z
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00453-y
Security attacks on smart grid scheduling and their defences: a game-theoretic approach
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00460-z
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00436-z
FOTB: a secure blockchain-based firmware update framework for IoT environment
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00467-6
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00448-9
Repairing an aggregation-based smart metering system
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00435-0
Random dictatorship for privacy-preserving social choice
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00474-7
DUEF-GA: data utility and privacy evaluation framework for graph anonymization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00469-4
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00441-2
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00459-6
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00476-5
Analysis of some simple stabilizers for physically obfuscated keys
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00473-8
Message from the guest editors
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00472-9
Security analysis of secure kNN and ranked keyword search over encrypted data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00461-y
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00458-7
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00432-3
PDGuard: an architecture for the control and secure processing of personal data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00468-5
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00466-7
Cyberattack triage using incremental clustering for intrusion detection systems
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00478-3
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00455-w
File Guard: automatic format-based media file sanitization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00440-3
Group rekeying based on member join history
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00451-0
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00454-x
User-mediated authentication protocols and unforgeability in key collision
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00479-2
Key pre-distribution approach using block LU decomposition in wireless sensor network
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00477-4
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00480-9
Secure and trusted partial grey-box verification
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00431-4
Digital Waste Disposal: an automated framework for analysis of spam emails
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00470-x
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00447-w