researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
33
, Issue
2
97
--
120
Payal Sharma
,
B. R. Purushothama
.
A lightweight group key management scheme with constant rekeying cost and public bulletin size
121
--
137
Joakim Kävrestad
,
Steven Furnell
,
Marcus Nohlberg
.
User perception of Context-Based Micro-Training - a method for cybersecurity training
138
--
157
Thierry Mefenza
,
Damien Vergnaud
.
Lattice attacks on pairing-based signatures
158
--
171
Salifu Yusif
,
Abdul Hafeez-Baig
,
Charles Anachanser
.
Internet governance and cyber-security: a systematic literature review
172
--
191
Divya V. L.
,
Job P. A.
,
K. Preetha Mathew
.
Secure query processing and optimization in cloud environment: a review
Volume
33
, Issue
1
1
--
15
Rajesh Bingu
,
S. Jothilakshmi 0001
,
N. Srinivasu
.
Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment
42
--
53
Farid Javani
,
Alan T. Sherman
.
BVOT: self-tallying boardroom voting with oblivious transfer
54
--
72
Nelson Russo
,
Leonilde Reis
,
Maria Clara Silveira
,
Henrique S. Mamede
.
Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review
73
--
95
Savitha M. M
,
Basarkod P. I
.
Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms