Skip to main content

Articles

Page 2 of 4

  1. We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and secu...

    Authors: Jose Rubio-Hernan, Luca De Cicco and Joaquin Garcia-Alfaro

    Citation: EURASIP Journal on Information Security 2017 2017:8

    Content type: Research

    Published on:

  2. The availability of individual load profiles per household in the smart grid end-user domain combined with non-intrusive load monitoring to infer personal data from these load curves has led to privacy concern...

    Authors: Fabian Knirsch, Günther Eibl and Dominik Engel

    Citation: EURASIP Journal on Information Security 2017 2017:6

    Content type: Research

    Published on:

  3. Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detec...

    Authors: Lazaros K. Gallos, Maciej Korczyński and Nina H. Fefferman

    Citation: EURASIP Journal on Information Security 2017 2017:5

    Content type: Research

    Published on:

  4. Honeypots and honeynets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to ...

    Authors: Pavol Sokol, Jakub Míšek and Martin Husák

    Citation: EURASIP Journal on Information Security 2017 2017:4

    Content type: Research

    Published on:

  5. We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple out...

    Authors: Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer and Jos Weber

    Citation: EURASIP Journal on Information Security 2017 2017:3

    Content type: Research

    Published on:

  6. To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure...

    Authors: Feng Jiang and Brian King

    Citation: EURASIP Journal on Information Security 2017 2017:1

    Content type: Research

    Published on:

  7. We present a new method for random testing of binary executables inspired by biology. In our approach, we introduce the first fuzzer based on a mathematical model for optimal foraging. To minimize search time ...

    Authors: Konstantin Böttinger

    Citation: EURASIP Journal on Information Security 2016 2016:28

    Content type: Research

    Published on:

  8. Iris recognition technologies are deployed in numerous large-scale nation-wide projects in order to provide robust and reliable biometric recognition of individuals. Moreover, the iris has been found to be rat...

    Authors: Christian Rathgeb, Benjamin Tams, Johannes Wagner and Christoph Busch

    Citation: EURASIP Journal on Information Security 2016 2016:26

    Content type: Research

    Published on:

  9. Iris localisation and segmentation are challenging and critical tasks in iris biometric recognition. Especially in non-cooperative and less ideal environments, their impact on overall system performance has be...

    Authors: Peter Wild, Heinz Hofbauer, James Ferryman and Andreas Uhl

    Citation: EURASIP Journal on Information Security 2016 2016:25

    Content type: Research

    Published on:

  10. Law enforcement agencies around the world use ridge-based biometrics, especially fingerprints, to fight crime. Fingermarks that are left at a crime scene and identified as potentially having evidential value (...

    Authors: Johannes Kotzerke, Hao Hao, Stephen A. Davis, Robert Hayes, L. J. Spreeuwers, R. N. J. Veldhuis and K. J. Horadam

    Citation: EURASIP Journal on Information Security 2016 2016:24

    Content type: Research

    Published on:

  11. Malicious software, i.e., malware, has been a persistent threat in the information security landscape since the early days of personal computing. The recent targeted attacks extensively use non-executable malw...

    Authors: Nedim Šrndić and Pavel Laskov

    Citation: EURASIP Journal on Information Security 2016 2016:22

    Content type: Research

    Published on:

  12. In liberalized energy markets, matching consumption patterns to energy tariffs is desirable, but practically limited due to privacy concerns, both on the side of the consumer and on the side of the utilities. ...

    Authors: Andreas Unterweger, Fabian Knirsch, Günther Eibl and Dominik Engel

    Citation: EURASIP Journal on Information Security 2016 2016:21

    Content type: Research

    Published on:

  13. Due to compliance and IT security requirements, company-wide identity and access management within organizations has gained significant importance in research and practice over the last years. Companies aim at...

    Authors: Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs and Günther Pernul

    Citation: EURASIP Journal on Information Security 2016 2016:19

    Content type: Research

    Published on:

  14. Clouds are here to stay, and the same holds for cyber-physical systems—not to forget their combination. In light of these changing paradigms, it is of utter importance to reconsider security as both introduce ...

    Authors: Johanna Ullrich, Jordan Cropper, Peter Frühwirt and Edgar Weippl

    Citation: EURASIP Journal on Information Security 2016 2016:18

    Content type: Research

    Published on:

  15. Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to a...

    Authors: Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser and Georg Sigl

    Citation: EURASIP Journal on Information Security 2016 2016:17

    Content type: Research

    Published on:

  16. The trend of cloud databases is leaning towards Not Only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. One of the more prominen...

    Authors: Yumna Ghazi, Rahat Masood, Abid Rauf, Muhammad Awais Shibli and Osman Hassan

    Citation: EURASIP Journal on Information Security 2016 2016:16

    Content type: Research

    Published on:

  17. Cloud computing provides a convenient and on-demand access to virtually unlimited computing resources. Mobile cloud computing (MCC) is an emerging technology that integrates cloud computing technology with mob...

    Authors: Khadijah Bahwaireth, Lo’ai Tawalbeh, Elhadj Benkhelifa, Yaser Jararweh and Mohammad A. Tawalbeh

    Citation: EURASIP Journal on Information Security 2016 2016:15

    Content type: Research

    Published on:

  18. Cloud storages in cloud data centers can be used for enterprises and individuals to store and access their data remotely anywhere anytime without any additional burden. By data outsourcing, users can be reliev...

    Authors: Sheren A. El-Booz, Gamal Attiya and Nawal El-Fishawy

    Citation: EURASIP Journal on Information Security 2016 2016:13

    Content type: Research

    Published on:

  19. Taxonomy trees are used in machine learning, information retrieval, bioinformatics, and multi-agent systems for matching as well as matchmaking in e-business, e-marketplaces, and e-learning. A weighted tree si...

    Authors: Pramodh Krishna D. and Venu Gopal Rao K.

    Citation: EURASIP Journal on Information Security 2016 2016:12

    Content type: Research

    Published on:

  20. A true random number generator (TRNG) is proposed and evaluated by field-programmable gate arrays (FPGA) implementation that generates random numbers by exclusive-ORing (XORing) the outputs of many SR latches ...

    Authors: Naoya Torii, Hirotaka Kokubo, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka and Tsutomu Matsumoto

    Citation: EURASIP Journal on Information Security 2016 2016:10

    Content type: Research

    Published on:

  21. Software control is a critical issue in cyber-physical systems (CPS); if the expected behavior of the software embedded in a single device of a CPS cannot be enforced then the behavior of the whole CPS may be ...

    Authors: Raphael C. S. Machado, Davidson R. Boccardo, Vinícius G. Pereira de Sá and Jayme L. Szwarcfiter

    Citation: EURASIP Journal on Information Security 2016 2016:8

    Content type: Research

    Published on:

  22. With the rapid development of the cloud computing service, utilizing traditional access control models was difficult to meet the complex requirements of data protection in cloud environment. In cloud environme...

    Authors: Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang and Mingjie Chen

    Citation: EURASIP Journal on Information Security 2016 2016:7

    Content type: Research

    Published on:

  23. The encryption of network traffic complicates legitimate network monitoring, traffic analysis, and network forensics. In this paper, we present real-time lightweight identification of HTTPS clients based on ne...

    Authors: Martin Husák, Milan Čermák, Tomáš Jirsík and Pavel Čeleda

    Citation: EURASIP Journal on Information Security 2016 2016:6

    Content type: Research

    Published on:

  24. Aiming at the existing IP geolocation approaches does not consider the errors of landmarks and delay; a new geolocation approach-utilized landmark calibration is proposed in this paper. At first, we find out t...

    Authors: Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao and Guang Zhu

    Citation: EURASIP Journal on Information Security 2016 2016:4

    Content type: Research

    Published on:

  25. Smartphone advertisement is increasingly used among many applications and allows developers to obtain revenue through in-app advertising. Our study aims at identifying potential security risks of mobile-based ...

    Authors: Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi and Hyoungshick Kim

    Citation: EURASIP Journal on Information Security 2016 2016:2

    Content type: Research

    Published on:

  26. This paper develops a retrieval scheme for encrypted JPEG images based on a Markov process. In our scheme, the stream cipher and permutation encryption are combined to encrypt discrete cosine transform (DCT) c...

    Authors: Hang Cheng, Xinpeng Zhang, Jiang Yu and Fengyong Li

    Citation: EURASIP Journal on Information Security 2016 2016:1

    Content type: Research

    Published on:

  27. Information processing services are becoming increasingly pervasive, such as is demonstrated by the Internet of Things or smart grids. Given the importance that these services have reached in our daily life, t...

    Authors: Stefan Rass, Peter Schartner and Monika Brodbeck

    Citation: EURASIP Journal on Information Security 2015 2015:7

    Content type: Research

    Published on:

  28. In this paper, we propose two different solutions for making a recently proposed asymmetric fingerprinting protocol based on client-side embedding robust to collusion attacks. The first solution is based on pr...

    Authors: Tiziano Bianchi, Alessandro Piva and Dasara Shullani

    Citation: EURASIP Journal on Information Security 2015 2015:6

    Content type: Research

    Published on:

  29. Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR...

    Authors: José Marinho, Jorge Granjal and Edmundo Monteiro

    Citation: EURASIP Journal on Information Security 2015 2015:4

    Content type: Review

    Published on:

  30. To ensure the secure transmission of data, cryptography is treated as the most effective solution. Cryptographic key is an important entity in this process. In general, randomly generated cryptographic key (of...

    Authors: Subhas Barman, Debasis Samanta and Samiran Chattopadhyay

    Citation: EURASIP Journal on Information Security 2015 2015:3

    Content type: Research

    Published on:

  31. This paper investigates the statistical detection of JSteg steganography. The approach is based on a statistical model of discrete cosine transformation (DCT) coefficients challenging the usual assumption that...

    Authors: Tong Qiao, Florent Retraint, Rémi Cogranne and Cathel Zitzmann

    Citation: EURASIP Journal on Information Security 2015 2015:2

    Content type: Research

    Published on:

  32. In this paper we present Laribus, a peer-to-peer network designed to detect local man-in-the-middle attacks against secure socket layer/transport layer security (SSL/TLS). With Laribus, clients can validate th...

    Authors: Karl-Peter Fuchs, Dominik Herrmann, Andrea Micheloni and Hannes Federrath

    Citation: EURASIP Journal on Information Security 2015 2015:1

    Content type: Research

    Published on:

  33. Cyber security attacks are becoming ever more frequent and sophisticated. Enterprises often deploy several security protection mechanisms, such as anti-virus software, intrusion detection/prevention systems, a...

    Authors: Xin Hu, Ting Wang, Marc Ph Stoecklin, Douglas L Schales, Jiyong Jang and Reiner Sailer

    Citation: EURASIP Journal on Information Security 2014 2014:17

    Content type: Research

    Published on:

  34. Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS cache poisoning can be used to monitor users’ activities for censorship, to distribute malware and spam and to...

    Authors: Haya Shulman and Michael Waidner

    Citation: EURASIP Journal on Information Security 2014 2014:16

    Content type: Research

    Published on:

  35. The distributed and decentralized nature of peer-to-peer (P2P) networks has offered a lucrative alternative to bot-masters to build botnets. P2P botnets are not prone to any single point of failure and have be...

    Authors: Pratik Narang, Chittaranjan Hota and VN Venkatakrishnan

    Citation: EURASIP Journal on Information Security 2014 2014:15

    Content type: Research

    Published on:

  36. Many papers have already provided models to formally specify security policies. In this paper, security policies are modeled using deontic concepts of permission and obligation. Permission rules are used to sp...

    Authors: Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia and Anas Abou El Kalam

    Citation: EURASIP Journal on Information Security 2014 2014:13

    Content type: Research

    Published on:

  37. We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function, we choose the Dirichlet distribution with ...

    Authors: Sarah Ibrahimi, Boris Škorić and Jan-Jaap Oosterwijk

    Citation: EURASIP Journal on Information Security 2014 2014:12

    Content type: Research

    Published on:

Latest Tweets

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here