IEEE Transactions on Information Forensics and Security, ‎1556-6013

Journal

Publications

  1. 2020
  2. Published
  3. 2017
  4. Published

    DECIM: Detecting Endpoint Compromise In Messaging

    Mark Ryan & , 11 Aug 2017, In: IEEE Transactions on Information Forensics and Security. 13 p.

    Research output: Contribution to journalArticlepeer-review

  5. 2016
  6. Published

    On the Privacy and Performance of Mobile Anonymous Microblogging

    Erik Tews, , , & , Jul 2016, In: IEEE Transactions on Information Forensics and Security. 11, 7, p. 1578-1591

    Research output: Contribution to journalArticlepeer-review

  7. 2013
  8. Published

    Efficiently Outsourcing Multiparty Computation Under Multiple Keys

    Erik Tews & , 1 Nov 2013, In: IEEE Transactions on Information Forensics and Security. 8, 12, p. 2046-2058 13 p.

    Research output: Contribution to journalArticlepeer-review

  9. 2010
  10. Published

    An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature

    Guilin Wang, 1 Mar 2010, In: IEEE Transactions on Information Forensics and Security. 5, 1, p. 158-168 11 p.

    Research output: Contribution to journalArticle