


default search action
Journal of Information Security and Applications, Volume 45
Volume 45, April 2019
- Guorong Xuan, Xiaolong Li, Yun-Qing Shi:
Minimum entropy and histogram-pair based JPEG image reversible data hiding. 1-9 - Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng
, Kouichi Sakurai:
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust. 10-19
- Fatma K. Tabash
, Muhammed Izharuddin, Mosab I. Tabash
:
Encryption techniques for H.264/AVC videos: A literature review. 20-34 - Avishek Kumar
, Naveen K. Nishchal
:
Quick response code and interference-based optical asymmetric cryptosystem. 35-43 - Badal Soni
, Pradip K. Das, Dalton Meitei Thounaojam
:
Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features. 44-51 - Hafsa Assidi, Edoukou Berenger Ayebie
, El Mamoun Souidi
:
An efficient code-based threshold ring signature scheme. 52-60 - Behrooz Khosravi
, Behnam Khosravi, Bahman Khosravi, Khashayar Nazarkardeh:
A new method for pdf steganography in justified texts. 61-70 - Ali Fatahbeygi, Fardin Akhlaghian Tab:
A highly robust and secure image watermarking based on classification and visual cryptography. 71-78 - Ruba AlOmari
, Julie Thorpe
:
On password behaviours and attitudes in different populations. 79-89 - Dipti Kapoor Sarmah, Anand J. Kulkarni:
Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography. 90-106 - Daniel Schatz, Rabih Bashroush:
Security predictions - A way to reduce uncertainty. 107-116 - Bhaskar Mondal
, Shrey Singh, Prabhakar Kumar:
A secure image encryption scheme based on cellular automata and chaotic skew tent map. 117-130 - Fatemeh Nazerian
, Homayun Motameni, Hossein Nematzadeh
:
Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy. 131-142 - Youssef Harmouch, Rachid El Kouch:
The benefit of using chaos in key schedule algorithm. 143-155
- Mohammed Alshahrani, Issa Traoré:
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. 156-175

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.