Skip to main content

Articles

Page 2 of 4

  1. The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, the 5G networks...

    Authors: Filipo Sharevski
    Citation: EURASIP Journal on Information Security 2018 2018:8
  2. Current attacks are complex and stealthy. The recent WannaCry malware campaign demonstrates that this is true not only for targeted operations, but also for massive attacks. Complex attacks can only be describ...

    Authors: Julio Navarro, Véronique Legrand, Aline Deruyver and Pierre Parrend
    Citation: EURASIP Journal on Information Security 2018 2018:6
  3. Transaction traces analysis is a key utility for marketing, trend monitoring, and fraud detection purposes. However, they can also be used for designing and verification of contextual risk management systems f...

    Authors: Albert Sitek and Zbigniew Kotulski
    Citation: EURASIP Journal on Information Security 2018 2018:5
  4. Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very network where they are taking place. This review proposes a comprehensive framework for addressing the challenge of c...

    Authors: Pierre Parrend, Julio Navarro, Fabio Guigou, Aline Deruyver and Pierre Collet
    Citation: EURASIP Journal on Information Security 2018 2018:4
  5. In this work, side-channel attacks (SCAs) are considered as a security metric for the implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re-Keying Machines (TPM). A virtual s...

    Authors: Jonathan Martínez Padilla, Uwe Meyer-Baese and Simon Foo
    Citation: EURASIP Journal on Information Security 2018 2018:3
  6. Although 5G (fifth generation) networks are still in the realm of ideas, their architecture can be considered as reaching a forming phase. There are several reports and white papers which attempt to precise 5G...

    Authors: Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko and Jean-Philippe Wary
    Citation: EURASIP Journal on Information Security 2018 2018:2
  7. By analyzing multi-sensor information fusion system and hall for workshop of meta-synthetic engineering (HWME) essentially, a universal information fusion system of HWME based on multi-sensor is put forward. A...

    Authors: Guang Yang, Shuofeng Yu and Shouwen Wen
    Citation: EURASIP Journal on Information Security 2017 2017:18
  8. In modern times, people have paid more attention to their private information. The data confidentiality is very important in many economic aspects. In this paper, we proposed a secure auction system, in which ...

    Authors: Zhen Guo, Yu Fu and Chunjie Cao
    Citation: EURASIP Journal on Information Security 2017 2017:16
  9. Forensic research community keeps proposing new techniques to analyze digital images and videos. However, the performance of proposed tools are usually tested on data that are far from reality in terms of reso...

    Authors: Dasara Shullani, Marco Fontani, Massimo Iuliani, Omar Al Shaya and Alessandro Piva
    Citation: EURASIP Journal on Information Security 2017 2017:15
  10. Applications of secure multiparty computation such as certain electronic voting or auction protocols require Byzantine agreement on large sets of elements. Implementations proposed in the literature so far hav...

    Authors: Florian Dold and Christian Grothoff
    Citation: EURASIP Journal on Information Security 2017 2017:14
  11. Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC) models. If this approach was suitable when people had only a few games (like Snake or Tetris) installed on ...

    Authors: Arnaud Oglaza, Romain Laborde, Pascale Zaraté, Abdelmalek Benzekri and François Barrère
    Citation: EURASIP Journal on Information Security 2017 2017:13
  12. Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and requires assessments from different perpendicular viewpoints. However, current research focuses on reducing the impact...

    Authors: Alexander Motzek, Gustavo Gonzalez-Granadillo, Hervé Debar, Joaquin Garcia-Alfaro and Ralf Möller
    Citation: EURASIP Journal on Information Security 2017 2017:12
  13. Focused crawlers enable the automatic discovery of Web resources about a given topic by automatically navigating through the Web link structure and selecting the hyperlinks to follow by estimating their releva...

    Authors: Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis and Ioannis Kompatsiaris
    Citation: EURASIP Journal on Information Security 2017 2017:11
  14. Privacy inference attacks based on sensor data is an emerging and severe threat on smart devices, in which malicious applications leverage data from innocuous sensors to infer sensitive information of user, e....

    Authors: Xiaolong Bai, Jie Yin and Yu-Ping Wang
    Citation: EURASIP Journal on Information Security 2017 2017:10
  15. We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and secu...

    Authors: Jose Rubio-Hernan, Luca De Cicco and Joaquin Garcia-Alfaro
    Citation: EURASIP Journal on Information Security 2017 2017:8
  16. The availability of individual load profiles per household in the smart grid end-user domain combined with non-intrusive load monitoring to infer personal data from these load curves has led to privacy concern...

    Authors: Fabian Knirsch, Günther Eibl and Dominik Engel
    Citation: EURASIP Journal on Information Security 2017 2017:6
  17. Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detec...

    Authors: Lazaros K. Gallos, Maciej Korczyński and Nina H. Fefferman
    Citation: EURASIP Journal on Information Security 2017 2017:5
  18. Honeypots and honeynets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to ...

    Authors: Pavol Sokol, Jakub Míšek and Martin Husák
    Citation: EURASIP Journal on Information Security 2017 2017:4
  19. We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple out...

    Authors: Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer and Jos Weber
    Citation: EURASIP Journal on Information Security 2017 2017:3
  20. To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure...

    Authors: Feng Jiang and Brian King
    Citation: EURASIP Journal on Information Security 2017 2017:1
  21. We present a new method for random testing of binary executables inspired by biology. In our approach, we introduce the first fuzzer based on a mathematical model for optimal foraging. To minimize search time ...

    Authors: Konstantin Böttinger
    Citation: EURASIP Journal on Information Security 2016 2016:28
  22. Iris recognition technologies are deployed in numerous large-scale nation-wide projects in order to provide robust and reliable biometric recognition of individuals. Moreover, the iris has been found to be rat...

    Authors: Christian Rathgeb, Benjamin Tams, Johannes Wagner and Christoph Busch
    Citation: EURASIP Journal on Information Security 2016 2016:26
  23. Iris localisation and segmentation are challenging and critical tasks in iris biometric recognition. Especially in non-cooperative and less ideal environments, their impact on overall system performance has be...

    Authors: Peter Wild, Heinz Hofbauer, James Ferryman and Andreas Uhl
    Citation: EURASIP Journal on Information Security 2016 2016:25
  24. Law enforcement agencies around the world use ridge-based biometrics, especially fingerprints, to fight crime. Fingermarks that are left at a crime scene and identified as potentially having evidential value (...

    Authors: Johannes Kotzerke, Hao Hao, Stephen A. Davis, Robert Hayes, L. J. Spreeuwers, R. N. J. Veldhuis and K. J. Horadam
    Citation: EURASIP Journal on Information Security 2016 2016:24
  25. Malicious software, i.e., malware, has been a persistent threat in the information security landscape since the early days of personal computing. The recent targeted attacks extensively use non-executable malw...

    Authors: Nedim Šrndić and Pavel Laskov
    Citation: EURASIP Journal on Information Security 2016 2016:22
  26. In liberalized energy markets, matching consumption patterns to energy tariffs is desirable, but practically limited due to privacy concerns, both on the side of the consumer and on the side of the utilities. ...

    Authors: Andreas Unterweger, Fabian Knirsch, Günther Eibl and Dominik Engel
    Citation: EURASIP Journal on Information Security 2016 2016:21
  27. Due to compliance and IT security requirements, company-wide identity and access management within organizations has gained significant importance in research and practice over the last years. Companies aim at...

    Authors: Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs and Günther Pernul
    Citation: EURASIP Journal on Information Security 2016 2016:19
  28. Clouds are here to stay, and the same holds for cyber-physical systems—not to forget their combination. In light of these changing paradigms, it is of utter importance to reconsider security as both introduce ...

    Authors: Johanna Ullrich, Jordan Cropper, Peter Frühwirt and Edgar Weippl
    Citation: EURASIP Journal on Information Security 2016 2016:18
  29. Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to a...

    Authors: Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser and Georg Sigl
    Citation: EURASIP Journal on Information Security 2016 2016:17
  30. The trend of cloud databases is leaning towards Not Only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. One of the more prominen...

    Authors: Yumna Ghazi, Rahat Masood, Abid Rauf, Muhammad Awais Shibli and Osman Hassan
    Citation: EURASIP Journal on Information Security 2016 2016:16
  31. Cloud computing provides a convenient and on-demand access to virtually unlimited computing resources. Mobile cloud computing (MCC) is an emerging technology that integrates cloud computing technology with mob...

    Authors: Khadijah Bahwaireth, Lo’ai Tawalbeh, Elhadj Benkhelifa, Yaser Jararweh and Mohammad A. Tawalbeh
    Citation: EURASIP Journal on Information Security 2016 2016:15
  32. Cloud storages in cloud data centers can be used for enterprises and individuals to store and access their data remotely anywhere anytime without any additional burden. By data outsourcing, users can be reliev...

    Authors: Sheren A. El-Booz, Gamal Attiya and Nawal El-Fishawy
    Citation: EURASIP Journal on Information Security 2016 2016:13
  33. Taxonomy trees are used in machine learning, information retrieval, bioinformatics, and multi-agent systems for matching as well as matchmaking in e-business, e-marketplaces, and e-learning. A weighted tree si...

    Authors: Pramodh Krishna D. and Venu Gopal Rao K.
    Citation: EURASIP Journal on Information Security 2016 2016:12
  34. A true random number generator (TRNG) is proposed and evaluated by field-programmable gate arrays (FPGA) implementation that generates random numbers by exclusive-ORing (XORing) the outputs of many SR latches ...

    Authors: Naoya Torii, Hirotaka Kokubo, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka and Tsutomu Matsumoto
    Citation: EURASIP Journal on Information Security 2016 2016:10
  35. Software control is a critical issue in cyber-physical systems (CPS); if the expected behavior of the software embedded in a single device of a CPS cannot be enforced then the behavior of the whole CPS may be ...

    Authors: Raphael C. S. Machado, Davidson R. Boccardo, Vinícius G. Pereira de Sá and Jayme L. Szwarcfiter
    Citation: EURASIP Journal on Information Security 2016 2016:8
  36. With the rapid development of the cloud computing service, utilizing traditional access control models was difficult to meet the complex requirements of data protection in cloud environment. In cloud environme...

    Authors: Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang and Mingjie Chen
    Citation: EURASIP Journal on Information Security 2016 2016:7
  37. The encryption of network traffic complicates legitimate network monitoring, traffic analysis, and network forensics. In this paper, we present real-time lightweight identification of HTTPS clients based on ne...

    Authors: Martin Husák, Milan Čermák, Tomáš Jirsík and Pavel Čeleda
    Citation: EURASIP Journal on Information Security 2016 2016:6

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here