default search action
Journal of Information Security and Applications, Volume 61
Volume 61, September 2021
- Huili Wang, Wenping Ma, Fuyang Deng, Haibin Zheng, Qianhong Wu:
Dynamic threshold ECDSA signature and application to asset custody in blockchain. 102805 - Deepika Ghai, Shailendra Tiwari, N. N. Das:
Bottom-boosting differential evolution based digital image security analysis. 102811 - Hongmin Li, Tie Li, Wei Feng, Jing Zhang, Jun Zhang, Lixia Gan, Chunlai Li:
A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion. 102844 - Wei Wang, Lianhai Wang, Peijun Zhang, Shujiang Xu, Kunlun Fu, Lianxin Song, Shanshan Hu:
A privacy protection scheme for telemedicine diagnosis based on double blockchain. 102845 - Michael Kiperberg:
Preventing malicious communication using virtualization. 102871 - Minoru Kuribayashi, KokSheik Wong:
StealthPDF: Data hiding method for PDF file with no visual degradation. 102875 - Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan:
Crook-sourced intrusion detection as a service. 102880 - Vivek Dabra, Anju Bala, Saru Kumari:
Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments. 102889 - Mouna Rhahla, Sahar Allegue, Takoua Abdellatif:
Guidelines for GDPR compliance in Big Data systems. 102896 - Layth Sliman, Tasnime Omrani, Zahir Tari, Abed Ellatif Samhat, Rhouma Rhouma:
Towards an ultra lightweight block ciphers for Internet of Things. 102897 - Agneet Chatterjee, Soulib Ghosh, Anuran Chakraborty, Sudipta Kumar Ghosal, Ram Sarkar:
A two-phase gradient based feature embedding approach. 102898 - Nongmeikapam Brajabidhu Singh, Moirangthem Marjit Singh, Arindam Sarkar, Jyotsna Kumar Mandal:
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection. 102899 - Khalid Mahmood, Salman Shamshad, Minahil Rana, Akasha Shafiq, Shafiq Ahmad, Muhammad Arslan Akram, Ruhul Amin:
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication. 102900 - Maryam Hozhabr, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
Dynamic secure multi-keyword ranked search over encrypted cloud data. 102902 - László Erdödi, Åvald Åslaugson Sommervoll, Fabio Massimo Zennaro:
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents. 102903 - Jayaprakash Kar, Xiaoguang Liu, Fagen Li:
CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks. 102905 - Zeesha Mishra, Bibhudendra Acharya:
High throughput novel architectures of TEA family for high speed IoT and RFID applications. 102906 - Ajish S, K. S. Anil Kumar:
Secure mobile internet voting system using biometric authentication and wavelet based AES. 102908 - Ching-Nung Yang, Xiaotian Wu, Hsuan-Yu Lin, Cheonshik Kim:
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation. 102910 - Zhijun Wu, Wenzhi Feng, Jin Lei, Meng Yue:
I-CIFA: An improved collusive interest flooding attack in named data networking. 102912 - Mariem Bouchaala, Cherif Ghazel, Leïla Azouz Saïdane:
TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing. 102914 - Tanmoy Maitra, Shiwangi Singh, Ritwik Saurabh, Debasis Giri:
Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map. 102915 - Simone Fischer-Hübner, Cristina Alcaraz, Afonso Ferreira, M. Carmen Fernández Gago, Javier López, Evangelos P. Markatos, Lejla Islami, Mahdi Akil:
Stakeholder perspectives and requirements on cybersecurity in Europe. 102916 - Khaleel Ahmad, Afsar Kamal, Khairol Amali Bin Ahmad, Manju Khari, Rubén González Crespo:
Corrigendum to Fast hybrid-MixNet for security and privacy using NTRU algorithm: [Journal of Information Security and Applications, Volume 60, August 2021, Start page-End page/102872]. 102917 - Satyabrata Roy, Manu Shrivastava, Umashankar Rawat, Chirag Vinodkumar Pandey, Sanjeet Kumar Nayak:
IESCA: An efficient image encryption scheme using 2-D cellular automata. 102919 - Yu-Chen Chen, Jiann-Liang Chen, Yi-Wei Ma:
[email protected] Intelligent technical support scam detection system. 102921 - Kamalakanta Sethi, Venu Madhav Yatam, Rahul Kumar, Padmalochan Bera:
Attention based multi-agent intrusion detection systems using reinforcement learning. 102923 - Hui Zhu, Christian Gehrmann:
Lic-Sec: An enhanced AppArmor Docker security profile generator. 102924 - Slim Kallel, Frédéric Cuppens, Nora Boulahia-Cuppens, Ahmed Hadj Kacem, Lotfi Ben Othmane:
Special issue on risk and security of smart systems. 102925 - Ikhlass Ammar, Yamen El Touati, Moez Yeddes, John Mullins:
Bounded opacity for timed systems. 102926 - Haifeng Li, Yuxin Wang, Xingbing Fu, Caihui Lan, Caifen Wang, Fagen Li, He Guo:
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage. 102927 - Dheerendra Mishra, Saurabh Rana:
A provably secure content distribution framework for portable DRM systems. 102928 - Juliza Mohamad Arif, Mohd Faizal Ab Razak, Sharfah Ratibah Tuan Mat, Suryanti Awang, Nor Syahidatul Nadiah Binti Ismail, Ahmad Firdaus:
Android mobile malware detection using fuzzy AHP. 102929 - Tanveer ul Haq, Tariq Shah:
4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion. 102931 - Sanjeet Kumar Nayak, Somanath Tripathy:
SEPS: Efficient public-key based secure search over outsourced data. 102932 - Luhui Yang, Guangjie Liu, Jinwei Wang, Huiwen Bai, Jiangtao Zhai, Yuewei Dai:
Fast3DS: A real-time full-convolutional malicious domain name detection system. 102933 - Yagiz Yilmaz, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
Investigating the impact of ransomware splash screens. 102934 - Junjie Huang, Liang Tan, Wenjuan Li, Keping Yu:
RON-enhanced blockchain propagation mechanism for edge-enabled smart cities. 102936 - Mian Ahmad Jan, Kuo-Hui Yeh, Zhiyuan Tan, Yulei Wu:
Blockchain for edge-enabled smart cities applications. 102937 - Faiza Medjek, Djamel Tandjaoui, Nabil Djedjig, Imed Romdhani:
Multicast DIS attack mitigation in RPL-based IoT-LLNs. 102939 - Christophe Guerber, Mickaël Royer, Nicolas Larrieu:
Machine Learning and Software Defined Network to secure communications in a swarm of drones. 102940 - Sachin Kumar:
Image data security using Quasigroup combined with Fibonacci Q-transformation. 102941 - Raja Ettiane, Abdelaali Chaoub, Rachid Elkouch:
Toward securing the control plane of 5G mobile networks against DoS threats: Attack scenarios and promising solutions. 102943 - Nestor Tsafack, Abdullah M. Iliyasu, Jean De Dieu Nkapkop, Zeric Tabekoueng Njitacke, Jacques Kengne, Bassem Abd-El-Atty, Akram Belazi, Ahmed A. Abd El-Latif:
A memristive RLC oscillator dynamics applied to image encryption. 102944 - Seyyed Keyvan Mousavi, Ali Ghaffari:
Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system. 102945 - Mengli Wang, Lipeng Song:
Efficient defense strategy against spam and phishing email: An evolutionary game model. 102947 - Zheng Wang, Yang Guo:
Neural networks based domain name generation. 102948 - Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Qihe Liu, Yuyu Wang, Kwabena Owusu-Agyemang:
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions. 102949 - Hegui Zhu, Yujia Guo, Libo Zhang:
An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme. 102952 - Shuai Jiang, Hong Yao, Cai Fu, Yekui Qian, Lansheng Han:
Function-level obfuscation detection method based on Graph Convolutional Networks. 102953
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.