Articles

Sort by
Previous Page Page 2 of 6 Next Page
  1. Research

    The role and security of firewalls in cyber-physical cloud computing

    Clouds are here to stay, and the same holds for cyber-physical systems—not to forget their combination. In light of these changing paradigms, it is of utter importance to reconsider security as both introduce ...

    Johanna Ullrich, Jordan Cropper, Peter Frühwirt and Edgar Weippl

    EURASIP Journal on Information Security 2016 2016:18

    Published on: 12 August 2016

  2. Research

    A flexible framework for mobile device forensics based on cold boot attacks

    Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to a...

    Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser and Georg Sigl

    EURASIP Journal on Information Security 2016 2016:17

    Published on: 11 August 2016

  3. Research

    DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases

    The trend of cloud databases is leaning towards Not Only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. One of the more prominen...

    Yumna Ghazi, Rahat Masood, Abid Rauf, Muhammad Awais Shibli and Osman Hassan

    EURASIP Journal on Information Security 2016 2016:16

    Published on: 3 August 2016

  4. Research

    Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications

    Cloud computing provides a convenient and on-demand access to virtually unlimited computing resources. Mobile cloud computing (MCC) is an emerging technology that integrates cloud computing technology with mob...

    Khadijah Bahwaireth, Lo’ai Tawalbeh, Elhadj Benkhelifa, Yaser Jararweh and Mohammad A. Tawalbeh

    EURASIP Journal on Information Security 2016 2016:15

    Published on: 29 June 2016

  5. Research

    Generalized weighted tree similarity algorithms for taxonomy trees

    Taxonomy trees are used in machine learning, information retrieval, bioinformatics, and multi-agent systems for matching as well as matchmaking in e-business, e-marketplaces, and e-learning. A weighted tree si...

    Pramodh Krishna D. and Venu Gopal Rao K.

    EURASIP Journal on Information Security 2016 2016:12

    Published on: 3 June 2016

  6. Research

    An efficient privacy-preserving comparison protocol in smart metering systems

    In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy cons...

    Majid Nateghizad, Zekeriya Erkin and Reginald L. Lagendijk

    EURASIP Journal on Information Security 2016 2016:11

    Published on: 17 May 2016

  7. Research

    ASIC implementation of random number generators using SR latches and its evaluation

    A true random number generator (TRNG) is proposed and evaluated by field-programmable gate arrays (FPGA) implementation that generates random numbers by exclusive-ORing (XORing) the outputs of many SR latches ...

    Naoya Torii, Hirotaka Kokubo, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka and Tsutomu Matsumoto

    EURASIP Journal on Information Security 2016 2016:10

    Published on: 16 May 2016

  8. Research

    Software control and intellectual property protection in cyber-physical systems

    Software control is a critical issue in cyber-physical systems (CPS); if the expected behavior of the software embedded in a single device of a CPS cannot be enforced then the behavior of the whole CPS may be ...

    Raphael C. S. Machado, Davidson R. Boccardo, Vinícius G. Pereira de Sá and Jayme L. Szwarcfiter

    EURASIP Journal on Information Security 2016 2016:8

    Published on: 12 April 2016

  9. Research

    A new usage control protocol for data protection of cloud environment

    With the rapid development of the cloud computing service, utilizing traditional access control models was difficult to meet the complex requirements of data protection in cloud environment. In cloud environme...

    Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang and Mingjie Chen

    EURASIP Journal on Information Security 2016 2016:7

    Published on: 24 March 2016

  10. Research

    A landmark calibration-based IP geolocation approach

    Aiming at the existing IP geolocation approaches does not consider the errors of landmarks and delay; a new geolocation approach-utilized landmark calibration is proposed in this paper. At first, we find out t...

    Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao and Guang Zhu

    EURASIP Journal on Information Security 2016 2016:4

    Published on: 5 January 2016

  11. Research

    Markov process-based retrieval for encrypted JPEG images

    This paper develops a retrieval scheme for encrypted JPEG images based on a Markov process. In our scheme, the stream cipher and permutation encryption are combined to encrypt discrete cosine transform (DCT) c...

    Hang Cheng, Xinpeng Zhang, Jiang Yu and Fengyong Li

    EURASIP Journal on Information Security 2016 2016:1

    Published on: 4 January 2016

  12. Research

    Combating online fraud attacks in mobile-based advertising

    Smartphone advertisement is increasingly used among many applications and allows developers to obtain revenue through in-app advertising. Our study aims at identifying potential security risks of mobile-based ...

    Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi and Hyoungshick Kim

    EURASIP Journal on Information Security 2016 2016:2

    Published on: 4 January 2016

  13. Research

    Private function evaluation by local two-party computation

    Information processing services are becoming increasingly pervasive, such as is demonstrated by the Internet of Things or smart grids. Given the importance that these services have reached in our daily life, t...

    Stefan Rass, Peter Schartner and Monika Brodbeck

    EURASIP Journal on Information Security 2015 2015:7

    Published on: 22 December 2015

  14. Research

    Fingerprint-based crypto-biometric system for network security

    To ensure the secure transmission of data, cryptography is treated as the most effective solution. Cryptographic key is an important entity in this process. In general, randomly generated cryptographic key (of...

    Subhas Barman, Debasis Samanta and Samiran Chattopadhyay

    EURASIP Journal on Information Security 2015 2015:3

    Published on: 3 April 2015

  15. Research

    Steganalysis of JSteg algorithm using hypothesis testing theory

    This paper investigates the statistical detection of JSteg steganography. The approach is based on a statistical model of discrete cosine transformation (DCT) coefficients challenging the usual assumption that...

    Tong Qiao, Florent Retraint, Rémi Cogranne and Cathel Zitzmann

    EURASIP Journal on Information Security 2015 2015:2

    Published on: 13 March 2015

Previous Page Page 2 of 6 Next Page

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here