


default search action
EURASIP Journal on Information Security, Volume 2020
Volume 2020, 2020
- Davide Cozzolino
, Francesco Marra, Diego Gragnaniello
, Giovanni Poggi, Luisa Verdoliva:
Combining PRNU and noiseprint for robust and efficient device source identification. 1 - Nicholas Whiskerd, Nicklas Körtge, Kris Jürgens, Kevin Lamshöft
, Salatiel Ezennaya-Gomez, Claus Vielhauer, Jana Dittmann, Mario Hildebrandt:
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines. 2 - Carrie Wright
, Darryl Stewart:
Understanding visual lip-based biometric authentication for mobile devices. 3 - Elakkiya Ellavarason, Richard M. Guest, Farzin Deravi:
Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device. 4 - Angelo Sotgiu
, Ambra Demontis
, Marco Melis
, Battista Biggio, Giorgio Fumera, Xiaoyi Feng, Fabio Roli
:
Deep neural rejection against adversarial examples. 5 - Xinyi Ding
, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul Krueger, Michael Hahsler:
Swapped face detection using deep learning and subjective assessment. 6 - Junfeng Tian, Zilong Wang
, Zhen Li:
Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks. 7 - Kamalanathan Kandasamy
, Sethuraman Srinivas, Krishnashree Achuthan, P. Venkat Rangan:
IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. 8 - Philipp Muth, Matthias Geihs, Tolga Arul
, Johannes Buchmann, Stefan Katzenbeisser:
ELSA: efficient long-term secure storage of large datasets (full version) ∗. 9 - Olga Taran
, Shideh Rezaeifar, Taras Holotyak
, Slava Voloshynovskiy
:
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation. 10 - Keming Dong
, Hyoung Joong Kim, Xiaohan Yu, Xiaoqing Feng:
Reversible data hiding for binary images based on adaptive overlapping pattern. 11 - Cecilia Pasquini
, Rainer Böhme
:
Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition. 12 - Davood Noori
, Hassan Shakeri, Masood Niazi Torshiz:
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment. 13 - Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmad Dokoro Haruna, Noah Oluwatobi Akande
, Anthonia Aderonke Kayode:
A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm. 14 - Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Smooth adversarial examples. 15

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.