default search action
Security and Privacy, Volume 3
Volume 3, Number 1, January 2020
- Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes. - Mahdi Nikooghadam, Haleh Amintoosi:
A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol.
- Shohreh Hosseinzadeh, Bernardo Sequeiros, Pedro R. M. Inácio, Ville Leppänen:
Recent trends in applying TPM to cloud computing. - Amir A. Khwaja, Muniba Murtaza, Hafiz F. Ahmed:
A security feature framework for programming languages to minimize application layer vulnerabilities.
Volume 3, Number 2, March 2020
- Carlisle Adams:
A privacy-preserving Blockchain with fine-grained access control. - Umair Sarfraz, Sherali Zeadally, Masoom Alam:
Outsourcing IOTA proof-of-work to volunteer public devices. - El Habib Boudjema, Sergey Verlan, Lynda Mokdad, Christèle Faure:
VYPER: Vulnerability detection in binary code. - Fenia Ferra, Isabel Wagner, Eerke A. Boiten, Lee Hadlington, Ismini Psychoula, Richard Snape:
Challenges in assessing privacy impact: Tales from the front lines.
Volume 3, Number 3, May 2020
- Rajeev Singh, Sudeep Tanwar, Teek Parval Sharma:
Utilization of blockchain for mitigating the distributed denial of service attacks.
- Mahmoud Elkhodr, Belal Alsinglawi:
Data provenance and trust establishment in the Internet of Things. - Mohit Kumar Sharma, Manisha J. Nene:
Two-factor authentication using biometric based quantum operations. - Ismaila Adeniyi Kamil, Sunday Oyinlola Ogundoyin:
On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network. - Dharminder Dharminder, Dheerendra Mishra:
Understanding signcryption security in standard model. - Elias P. Duarte Jr., Carmem S. Hara, Pedro R. Torres Jr., Christian Gomes:
BackStreamDB: A stream processing engine for backbone traffic monitoring with anomaly detection.
Volume 3, Number 4, July 2020
Special Issue Articles
- George Stergiopoulos, Nick Kapetanas, Efstratios Vasilellis, Dimitris Gritzalis:
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis. - Waheeb Yaqub, Ibrahim Kamel, Zeyar Aung:
Toward watermarking compressed data in columnar database architectures. - Sana Belguith, Nesrine Kaaniche, Giovanni Russello:
CUPS: Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update.
Volume 3, Number 5, September 2020
- Olufunso Stephen Olorunsola, Francisca Nonyelum Ogwueleka, Abraham E. Evwiekpaefe:
Assessment of privacy and security perception of biometric technology case study of Kaduna state tertiary academic institutions.
- Shaik Vaseem Akram, Praveen Kumar Malik, Rajesh Singh, Anita Gehlot, Sudeep Tanwar:
Adoption of blockchain technology in various realms: Opportunities and challenges. - Al-Batool Al-Ghamdi, Ameenah Al-Sulami, Asia Othman Aljahdali:
On the security and confidentiality of quantum key distribution.
- Tuuli Siiskonen, Mika Rantonen:
Detecting Stuxnet-like data integrity attacks. - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
A new algorithm to find monic irreducible polynomials over extended Galois field GF(pq) using positional arithmetic. - Pandit Byomakesha Dash, Janmenjoy Nayak, Bighnaraj Naik, Etuari Oram, SK Hafizul Islam:
Model based IoT security framework using multiclass adaptive boosting with SMOTE. - Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Kailash Wamanrao Kalare, Sunil D. Bagde:
An efficient ID-based cryptographic technique using IFP and GDLP. - Jeyakumar Samantha Tharani, Nalin A. G. Arachchilage:
Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach. - Ahmet Fatih Mustacoglu, Ferhat Özgür Çatak, Geoffrey C. Fox:
Password-based encryption approach for securing sensitive data. - Mfanasibili Ngwenya, Mpho Ngoepe:
A framework for data security, privacy, and trust in "consumer internet of things" assemblages in South Africa. - Brooke Nodeland, Scott Belshaw:
Establishing a criminal justice cyber lab to develop and enhance professional and educational opportunities.
Volume 3, Number 6, November 2020
- Yuriy Khanas, Michal Borecki:
Research on the use of algorithms for matrix transformations for encrypting text information. - Ankitha Vaddeti, Deepthi Vidiyala, Vineetha Puritipati, Raveendra Babu Ponnuru, Ji Sun Shin, Goutham Reddy Alavalapati:
Graphical passwords: Behind the attainment of goals. - Giddeon Njamngang Angafor, Iryna Yevseyeva, Ying He:
Game-based learning: A review of tabletop exercises for cybersecurity incident response training. - Akhila G. P., Gayathri R., Keerthana S., Angelin Gladston:
A machine learning framework for domain generating algorithm based malware detection. - Morris Ntonja, Moses Ashawa:
Examining artifacts generated by setting Facebook Messenger as a default SMS application on Android: Implication for personal data privacy. - Mohit Kumar Sharma, Manisha J. Nene:
Dual factor third-party biometric-based authentication scheme using quantum one time passwords†. - Sourav Kunal, Parth Gandhi, Ronak Sutariya, Hardik Tarpara:
A secure software defined networking for distributed environment.
- Mahdi Daghmehchi Firoozjaei, Rongxing Lu, Ali A. Ghorbani:
An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.