default search action
International Journal of Information and Computer Security, Volume 22
Volume 22, Number 1, 2023
- Zhijun Wu, Chenlei Zhang, Junjun Guo:
A method of speech information hiding in inactive frame based on pitch modulation. 1-27 - Bhanu Chander, Kumaravelan Gopalakrishnan:
Outlier detection in WSN with SVDD via multi-interpolation auto-encoder. 28-59 - M. H. Abhilash, B. B. Amberker:
Dynamic group signature scheme using ideal lattices. 60-90 - Muhammad Kashif Azhar, Bin Yao, Zhongpu Chen:
Enriching blockchain with spatial keyword query processing. 91-116 - Synim Selimi, Blerim Rexha, Kamer Vishi:
CyberNFTs: conceptualising a decentralised and reward-driven intrusion detection system with ML. 117-138
Volume 22, Number 2, 2023
- Ancy Sherin Jose, Latha R. Nair, Varghese Paul:
Tree derived feature importance and Bayesian optimisation for improved multi-class classification of DDoS attacks in software defined networks. 139-166 - Lijiao Chen, Kewei Lv:
Ciphertext-policy attribute-based delay encryption. 167-185 - Lizhe Zhang, Zhuoning Bai, Zhijun Wu, Kenian Wang:
Unified identity authentication scheme of system wide information management based on SAML-PKI-LDAP. 186-209 - Dilip Kumar, Manoj Kumar:
Outsourcing decryption of KP-ABE using elliptic curve cryptography. 210-229 - Oualid Demigha, Nabil Haddad:
Formal verification of software-only mechanisms for live migration of SGX enclaves. 230-261
Volume 22, Numbers 3/4, 2023
- Shipra Kumari, Hrishikesh Mahato:
Construction of weighted orthogonal matrices over finite field and its application in cryptography. 263-276 - Samson Ebenezar Uthirapathy, Domnic Sandanam:
Sentiment analysis in social network data using multilayer perceptron neural network with hill-climbing meta-heuristic optimisation. 277-297 - Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand:
Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud. 298-322 - Abiy Tadesse Abebe, Yalemzewd Negash Shiferaw, P. G. V. Suresh Kumar:
Lightweight integrated cryptosystem based on reconfigurable hardware for IoT security. 323-353 - S. Jayashree, S. V. N. Santhosh Kumar:
A comprehensive survey on effective key management schemes for secured authentication in vehicular ad hoc network. 354-376 - Santosh Kumar Ravva, Sureddi R. M. Krishna:
Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach. 377-389 - Zhenquan Ding, Hui Xu, Lei Cui, Haiqiang Fei, Yongji Liu, Zhiyu Hao:
HEMC: a dynamic behaviour analysis system for malware based on hardware virtualisation. 390-410 - Umesh Kumar, Vadlamudi Ch. Venkaiah:
A novel stream cipher based on quasigroups and QG-PRNG. 411-435 - Ruchi Agarwal, Manoj Kumar:
A privacy preserving scheme for encrypted medical images using RDH. 436-452 - Mohammed Almehdhar, Mohammed M. Abdelsamea, Na Ruan:
Deep multi-locality convolutional neural network for DDoS detection in smart home IoT. 453-474
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.