Articles

Sort by
Previous Page Page 1 of 5 Next Page
  1. Research

    Improved privacy of dynamic group services

    We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple out...

    Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer and Jos Weber

    EURASIP Journal on Information Security 2017 2017:3

    Published on: 1 February 2017

  2. Research

    A novel quality assessment for visual secret sharing schemes

    To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure...

    Feng Jiang and Brian King

    EURASIP Journal on Information Security 2017 2017:1

    Published on: 19 January 2017

  3. Research

    Fuzzing binaries with Lévy flight swarms

    We present a new method for random testing of binary executables inspired by biology. In our approach, we introduce the first fuzzer based on a mathematical model for optimal foraging. To minimize search time ...

    Konstantin Böttinger

    EURASIP Journal on Information Security 2016 2016:28

    Published on: 21 November 2016

  4. Research

    Unlinkable improved multi-biometric iris fuzzy vault

    Iris recognition technologies are deployed in numerous large-scale nation-wide projects in order to provide robust and reliable biometric recognition of individuals. Moreover, the iris has been found to be rat...

    Christian Rathgeb, Benjamin Tams, Johannes Wagner and Christoph Busch

    EURASIP Journal on Information Security 2016 2016:26

    Published on: 2 November 2016

  5. Research

    Quality-based iris segmentation-level fusion

    Iris localisation and segmentation are challenging and critical tasks in iris biometric recognition. Especially in non-cooperative and less ideal environments, their impact on overall system performance has be...

    Peter Wild, Heinz Hofbauer, James Ferryman and Andreas Uhl

    EURASIP Journal on Information Security 2016 2016:25

    Published on: 26 October 2016

  6. Research

    Identification performance of evidential value estimation for ridge-based biometrics

    Law enforcement agencies around the world use ridge-based biometrics, especially fingerprints, to fight crime. Fingermarks that are left at a crime scene and identified as potentially having evidential value (...

    Johannes Kotzerke, Hao Hao, Stephen A. Davis, Robert Hayes, L. J. Spreeuwers, R. N. J. Veldhuis and K. J. Horadam

    EURASIP Journal on Information Security 2016 2016:24

    Published on: 26 October 2016

  7. Research

    Privacy-preserving load profile matching for tariff decisions in smart grids

    In liberalized energy markets, matching consumption patterns to energy tariffs is desirable, but practically limited due to privacy concerns, both on the side of the consumer and on the side of the utilities. ...

    Andreas Unterweger, Fabian Knirsch, Günther Eibl and Dominik Engel

    EURASIP Journal on Information Security 2016 2016:21

    Published on: 26 September 2016

  8. Research

    Hidost: a static machine-learning-based detector of malicious files

    Malicious software, i.e., malware, has been a persistent threat in the information security landscape since the early days of personal computing. The recent targeted attacks extensively use non-executable malw...

    Nedim Šrndić and Pavel Laskov

    EURASIP Journal on Information Security 2016 2016:22

    Published on: 26 September 2016

  9. Research

    DST approach to enhance audio quality on lost audio packet steganography

    Lost audio packet steganography (LACK) is a steganography technique established on the VoIP network. LACK provides a high-capacity covert channel over VoIP network by artificially delaying and dropping a numbe...

    Qilin Qi, Dongming Peng and Hamid Sharif

    EURASIP Journal on Information Security 2016 2016:20

    Published on: 23 September 2016

  10. Research

    Adaptive identity and access management—contextual data based policies

    Due to compliance and IT security requirements, company-wide identity and access management within organizations has gained significant importance in research and practice over the last years. Companies aim at...

    Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs and Günther Pernul

    EURASIP Journal on Information Security 2016 2016:19

    Published on: 15 August 2016

  11. Research

    The role and security of firewalls in cyber-physical cloud computing

    Clouds are here to stay, and the same holds for cyber-physical systems—not to forget their combination. In light of these changing paradigms, it is of utter importance to reconsider security as both introduce ...

    Johanna Ullrich, Jordan Cropper, Peter Frühwirt and Edgar Weippl

    EURASIP Journal on Information Security 2016 2016:18

    Published on: 12 August 2016

  12. Research

    A flexible framework for mobile device forensics based on cold boot attacks

    Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to a...

    Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser and Georg Sigl

    EURASIP Journal on Information Security 2016 2016:17

    Published on: 11 August 2016

  13. Research

    DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases

    The trend of cloud databases is leaning towards Not Only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. One of the more prominen...

    Yumna Ghazi, Rahat Masood, Abid Rauf, Muhammad Awais Shibli and Osman Hassan

    EURASIP Journal on Information Security 2016 2016:16

    Published on: 3 August 2016

  14. Research

    Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications

    Cloud computing provides a convenient and on-demand access to virtually unlimited computing resources. Mobile cloud computing (MCC) is an emerging technology that integrates cloud computing technology with mob...

    Khadijah Bahwaireth, Lo’ai Tawalbeh, Elhadj Benkhelifa, Yaser Jararweh and Mohammad A. Tawalbeh

    EURASIP Journal on Information Security 2016 2016:15

    Published on: 29 June 2016

  15. Research

    Generalized weighted tree similarity algorithms for taxonomy trees

    Taxonomy trees are used in machine learning, information retrieval, bioinformatics, and multi-agent systems for matching as well as matchmaking in e-business, e-marketplaces, and e-learning. A weighted tree si...

    Pramodh Krishna D. and Venu Gopal Rao K.

    EURASIP Journal on Information Security 2016 2016:12

    Published on: 3 June 2016

  16. Research

    An efficient privacy-preserving comparison protocol in smart metering systems

    In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy cons...

    Majid Nateghizad, Zekeriya Erkin and Reginald L. Lagendijk

    EURASIP Journal on Information Security 2016 2016:11

    Published on: 17 May 2016

  17. Research

    ASIC implementation of random number generators using SR latches and its evaluation

    A true random number generator (TRNG) is proposed and evaluated by field-programmable gate arrays (FPGA) implementation that generates random numbers by exclusive-ORing (XORing) the outputs of many SR latches ...

    Naoya Torii, Hirotaka Kokubo, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka and Tsutomu Matsumoto

    EURASIP Journal on Information Security 2016 2016:10

    Published on: 16 May 2016

  18. Research

    Software control and intellectual property protection in cyber-physical systems

    Software control is a critical issue in cyber-physical systems (CPS); if the expected behavior of the software embedded in a single device of a CPS cannot be enforced then the behavior of the whole CPS may be ...

    Raphael C. S. Machado, Davidson R. Boccardo, Vinícius G. Pereira de Sá and Jayme L. Szwarcfiter

    EURASIP Journal on Information Security 2016 2016:8

    Published on: 12 April 2016

  19. Research

    A new usage control protocol for data protection of cloud environment

    With the rapid development of the cloud computing service, utilizing traditional access control models was difficult to meet the complex requirements of data protection in cloud environment. In cloud environme...

    Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang and Mingjie Chen

    EURASIP Journal on Information Security 2016 2016:7

    Published on: 24 March 2016

Previous Page Page 1 of 5 Next Page