Skip to main content

Articles

Page 3 of 5

  1. Malicious software, i.e., malware, has been a persistent threat in the information security landscape since the early days of personal computing. The recent targeted attacks extensively use non-executable malw...

    Authors: Nedim Šrndić and Pavel Laskov
    Citation: EURASIP Journal on Information Security 2016 2016:22
  2. Due to compliance and IT security requirements, company-wide identity and access management within organizations has gained significant importance in research and practice over the last years. Companies aim at...

    Authors: Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs and Günther Pernul
    Citation: EURASIP Journal on Information Security 2016 2016:19
  3. Clouds are here to stay, and the same holds for cyber-physical systems—not to forget their combination. In light of these changing paradigms, it is of utter importance to reconsider security as both introduce ...

    Authors: Johanna Ullrich, Jordan Cropper, Peter Frühwirt and Edgar Weippl
    Citation: EURASIP Journal on Information Security 2016 2016:18
  4. Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to a...

    Authors: Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser and Georg Sigl
    Citation: EURASIP Journal on Information Security 2016 2016:17
  5. The trend of cloud databases is leaning towards Not Only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. One of the more prominen...

    Authors: Yumna Ghazi, Rahat Masood, Abid Rauf, Muhammad Awais Shibli and Osman Hassan
    Citation: EURASIP Journal on Information Security 2016 2016:16
  6. Cloud computing provides a convenient and on-demand access to virtually unlimited computing resources. Mobile cloud computing (MCC) is an emerging technology that integrates cloud computing technology with mob...

    Authors: Khadijah Bahwaireth, Lo’ai Tawalbeh, Elhadj Benkhelifa, Yaser Jararweh and Mohammad A. Tawalbeh
    Citation: EURASIP Journal on Information Security 2016 2016:15
  7. Cloud storages in cloud data centers can be used for enterprises and individuals to store and access their data remotely anywhere anytime without any additional burden. By data outsourcing, users can be reliev...

    Authors: Sheren A. El-Booz, Gamal Attiya and Nawal El-Fishawy
    Citation: EURASIP Journal on Information Security 2016 2016:13
  8. Taxonomy trees are used in machine learning, information retrieval, bioinformatics, and multi-agent systems for matching as well as matchmaking in e-business, e-marketplaces, and e-learning. A weighted tree si...

    Authors: Pramodh Krishna D. and Venu Gopal Rao K.
    Citation: EURASIP Journal on Information Security 2016 2016:12
  9. A true random number generator (TRNG) is proposed and evaluated by field-programmable gate arrays (FPGA) implementation that generates random numbers by exclusive-ORing (XORing) the outputs of many SR latches ...

    Authors: Naoya Torii, Hirotaka Kokubo, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka and Tsutomu Matsumoto
    Citation: EURASIP Journal on Information Security 2016 2016:10
  10. Software control is a critical issue in cyber-physical systems (CPS); if the expected behavior of the software embedded in a single device of a CPS cannot be enforced then the behavior of the whole CPS may be ...

    Authors: Raphael C. S. Machado, Davidson R. Boccardo, Vinícius G. Pereira de Sá and Jayme L. Szwarcfiter
    Citation: EURASIP Journal on Information Security 2016 2016:8
  11. With the rapid development of the cloud computing service, utilizing traditional access control models was difficult to meet the complex requirements of data protection in cloud environment. In cloud environme...

    Authors: Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang and Mingjie Chen
    Citation: EURASIP Journal on Information Security 2016 2016:7
  12. The encryption of network traffic complicates legitimate network monitoring, traffic analysis, and network forensics. In this paper, we present real-time lightweight identification of HTTPS clients based on ne...

    Authors: Martin Husák, Milan Čermák, Tomáš Jirsík and Pavel Čeleda
    Citation: EURASIP Journal on Information Security 2016 2016:6
  13. Aiming at the existing IP geolocation approaches does not consider the errors of landmarks and delay; a new geolocation approach-utilized landmark calibration is proposed in this paper. At first, we find out t...

    Authors: Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao and Guang Zhu
    Citation: EURASIP Journal on Information Security 2016 2016:4
  14. Smartphone advertisement is increasingly used among many applications and allows developers to obtain revenue through in-app advertising. Our study aims at identifying potential security risks of mobile-based ...

    Authors: Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi and Hyoungshick Kim
    Citation: EURASIP Journal on Information Security 2016 2016:2
  15. This paper develops a retrieval scheme for encrypted JPEG images based on a Markov process. In our scheme, the stream cipher and permutation encryption are combined to encrypt discrete cosine transform (DCT) c...

    Authors: Hang Cheng, Xinpeng Zhang, Jiang Yu and Fengyong Li
    Citation: EURASIP Journal on Information Security 2016 2016:1
  16. Information processing services are becoming increasingly pervasive, such as is demonstrated by the Internet of Things or smart grids. Given the importance that these services have reached in our daily life, t...

    Authors: Stefan Rass, Peter Schartner and Monika Brodbeck
    Citation: EURASIP Journal on Information Security 2015 2015:7
  17. In this paper, we propose two different solutions for making a recently proposed asymmetric fingerprinting protocol based on client-side embedding robust to collusion attacks. The first solution is based on pr...

    Authors: Tiziano Bianchi, Alessandro Piva and Dasara Shullani
    Citation: EURASIP Journal on Information Security 2015 2015:6
  18. Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR...

    Authors: José Marinho, Jorge Granjal and Edmundo Monteiro
    Citation: EURASIP Journal on Information Security 2015 2015:4
  19. To ensure the secure transmission of data, cryptography is treated as the most effective solution. Cryptographic key is an important entity in this process. In general, randomly generated cryptographic key (of...

    Authors: Subhas Barman, Debasis Samanta and Samiran Chattopadhyay
    Citation: EURASIP Journal on Information Security 2015 2015:3
  20. This paper investigates the statistical detection of JSteg steganography. The approach is based on a statistical model of discrete cosine transformation (DCT) coefficients challenging the usual assumption that...

    Authors: Tong Qiao, Florent Retraint, Rémi Cogranne and Cathel Zitzmann
    Citation: EURASIP Journal on Information Security 2015 2015:2
  21. In this paper we present Laribus, a peer-to-peer network designed to detect local man-in-the-middle attacks against secure socket layer/transport layer security (SSL/TLS). With Laribus, clients can validate th...

    Authors: Karl-Peter Fuchs, Dominik Herrmann, Andrea Micheloni and Hannes Federrath
    Citation: EURASIP Journal on Information Security 2015 2015:1
  22. Cyber security attacks are becoming ever more frequent and sophisticated. Enterprises often deploy several security protection mechanisms, such as anti-virus software, intrusion detection/prevention systems, a...

    Authors: Xin Hu, Ting Wang, Marc Ph Stoecklin, Douglas L Schales, Jiyong Jang and Reiner Sailer
    Citation: EURASIP Journal on Information Security 2014 2014:17
  23. Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS cache poisoning can be used to monitor users’ activities for censorship, to distribute malware and spam and to...

    Authors: Haya Shulman and Michael Waidner
    Citation: EURASIP Journal on Information Security 2014 2014:16
  24. The distributed and decentralized nature of peer-to-peer (P2P) networks has offered a lucrative alternative to bot-masters to build botnets. P2P botnets are not prone to any single point of failure and have be...

    Authors: Pratik Narang, Chittaranjan Hota and VN Venkatakrishnan
    Citation: EURASIP Journal on Information Security 2014 2014:15
  25. Many papers have already provided models to formally specify security policies. In this paper, security policies are modeled using deontic concepts of permission and obligation. Permission rules are used to sp...

    Authors: Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia and Anas Abou El Kalam
    Citation: EURASIP Journal on Information Security 2014 2014:13
  26. We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function, we choose the Dirichlet distribution with ...

    Authors: Sarah Ibrahimi, Boris Škorić and Jan-Jaap Oosterwijk
    Citation: EURASIP Journal on Information Security 2014 2014:12
  27. Online social networks (OSNs) have become an integral part of social interaction and communication between people. Reasons include the ubiquity of OSNs that is offered through mobile devices and the possibilit...

    Authors: Christian Richthammer, Michael Netter, Moritz Riesner, Johannes Sänger and Günther Pernul
    Citation: EURASIP Journal on Information Security 2014 2014:11
  28. This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. T...

    Authors: Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya and Patrick Bas
    Citation: EURASIP Journal on Information Security 2014 2014:9
  29. In this work, by exploiting the traces left by double compression in the statistics of quantized modified discrete cosine transform coefficients, a single measure has been derived that allows to decide whether...

    Authors: Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo and Alessandro Piva
    Citation: EURASIP Journal on Information Security 2014 2014:10
  30. This paper proposes a novel steganography technique, where edges in the cover image have been used to embed messages. Amount of data to be embedded plays an important role on the selection of edges, i.e., the ...

    Authors: Saiful Islam, Mangat R Modi and Phalguni Gupta
    Citation: EURASIP Journal on Information Security 2014 2014:8
  31. The long-term evolution (LTE) is the newly adopted technology to offer enhanced capacity and coverage for current mobility networks, which experience a constant traffic increase and skyrocketing bandwidth dema...

    Authors: Roger Piqueras Jover, Joshua Lackey and Arvind Raghavan
    Citation: EURASIP Journal on Information Security 2014 2014:7
  32. 419 scam (also referred to as Nigerian scam) is a popular form of fraud in which the fraudster tricks the victim into paying a certain amount of money under the promise of a future, larger payoff.

    Authors: Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon and David Balzarotti
    Citation: EURASIP Journal on Information Security 2014 2014:4
  33. Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally i...

    Authors: Eirini Karapistoli and Anastasios A Economides
    Citation: EURASIP Journal on Information Security 2014 2014:3
  34. Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion function. The design of the distorti...

    Authors: Vojtěch Holub, Jessica Fridrich and Tomáš Denemark
    Citation: EURASIP Journal on Information Security 2014 2014:1
  35. Recent studies exposed the weaknesses of scale-invariant feature transform (SIFT)-based analysis by removing keypoints without significantly deteriorating the visual quality of the counterfeited image. As a co...

    Authors: Irene Amerini, Mauro Barni, Roberto Caldelli and Andrea Costanzo
    Citation: EURASIP Journal on Information Security 2013 2013:8
  36. The manual forensics investigation of security incidents is an opaque process that involves the collection and correlation of diverse evidence. In this work we first conduct a complex experiment to expand our ...

    Authors: Elias Raftopoulos and Xenofontas Dimitropoulos
    Citation: EURASIP Journal on Information Security 2013 2013:7
  37. The Internet is an essential tool for everyday tasks. Aside from common use, the option to browse the Internet privately is a desirable attribute. However, this can create a problem when private Internet sessi...

    Authors: Donny J Ohana and Narasimha Shashidhar
    Citation: EURASIP Journal on Information Security 2013 2013:6
  38. Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a d...

    Authors: Zekeriya Erkin, Thijs Veugen, Tomas Toft and Reginald L Lagendijk
    Citation: EURASIP Journal on Information Security 2013 2013:4

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    3.6 - 2-year Impact Factor
    3.6 - 5-year Impact Factor
    1.461 - SNIP (Source Normalized Impact per Paper)
    0.901 - SJR (SCImago Journal Rank)

    2022 Speed
    71 days submission to first editorial decision for all manuscripts (Median)
    236 days submission to accept (Median)

    2022 Usage 
    210,880 downloads
    61 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here