Skip to main content


International Journal of Information Security

International Journal of Information Security OnlineFirst articles

15.07.2019 | Regular Contribution

Group rekeying based on member join history

This paper presents GREP, a novel group rekeying scheme that leverages the history of join events in order to achieve efficiency and high scalability. GREP rekeys the group with only two broadcast messages, hence displaying an overhead which is …

15.07.2019 | Regular Contribution

SEDS: secure and efficient server-aided data deduplication scheme for cloud storage

Data deduplication is frequently used by many cloud service providers (CSPs) for efficient storage management. This process facilitates CSPs not to store the duplicate copies of a file. However, as data privacy is critical, data owners encrypt …

10.07.2019 | Special Issue Paper

Feature dynamic deep learning approach for DDoS mitigation within the ISP domain

The emergence of the Mirai malware facilitated a DDoS attack vector to surge to almost 1 Tbps in 2016, instigated by less than 150,000 infected IoT devices. With the infection of five new IoT devices per minute, the size of Mirai botnet was …

05.07.2019 | Regular contribution Open Access

SonarSnoop: active acoustic side-channel attacks

We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals, and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be …

04.07.2019 | Regular Contribution

Attacks on smart grid: power supply interruption and malicious power generation

Electric power supply is an essential component for several sectors including manufacturing, healthcare, building management, water distribution, and transportation systems. Hence, any interruption in electric power is likely to have an …

Aktuelle Ausgaben

Über diese Zeitschrift

The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.

Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility; and foundations: privacy, access control, authentication, identification, applied cryptography, and formal methods in information security.

Weitere Informationen

Premium Partner