Skip to main content
Top

International Journal of Information Security

Issue 4/2014

Content (6 Articles)

Regular Contribution

Efficient verifiably encrypted signatures from lattices

Kee Sung Kim, Ik Rae Jeong

Regular Contribution

Lattice-based certificateless public-key encryption in the standard model

Reza Sepahi, Ron Steinfeld, Josef Pieprzyk

Regular Contribution

Sufficient conditions for sound tree and sequential hashing modes

Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche

Regular Contribution

Enhancing security of cookie-based sessions in mobile networks using sparse caching

Amerah Alabrah, Jeffrey Cashion, Mostafa Bassiouni

Regular Contribution

ARITO: Cyber-attack response system using accurate risk impact tolerance

Alireza Shameli-Sendi, Michel Dagenais

Regular Contribution

Randomized gossip algorithms under attack

Mousa Mousazadeh, Behrouz Tork Ladani

Premium Partner