![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 53
Volume 53, August 2020
- Longbin Chen, Li-Chiou Chen, Nader Nassar:
Carp: A cost-aware relaxed protocol for encrypted data stores. 102501 - Soumya Banerjee, Sandip Roy, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay
, Joel J. P. C. Rodrigues, Youngho Park:
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment. 102503 - Mehdi Yadollahi
, Rasul Enayatifar, Hossein Nematzadeh
, Malrey Lee, Jae-Young Choi:
A novel image security technique based on nucleic acid concepts. 102505 - Hang Gao, Tiegang Gao, Renhong Cheng:
Robust detection of median filtering based on data-pair histogram feature and local configuration pattern. 102506 - Hu Xiong, Yan Wu, Chunhua Su, Kuo-Hui Yeh:
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things. 102507 - Milad Jafari Barani, Peyman Ayubi
, Milad Yousefi Valandar
, Behzad Yosefnezhad Irani:
A new Pseudo random number generator based on generalized Newton complex map with dynamic key. 102509 - Juntao Gao, Tong Wu, Xuelian Li:
Secure, fair and instant data trading scheme based on bitcoin. 102511 - Nibedita Kundu, Sumit Kumar Debnath, Dheerendra Mishra
, Tanmay Choudhury:
Post-quantum digital signature scheme based on multivariate cubic problem. 102512 - Vinod Ramesh Falmari, M. Brindha:
Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem. 102513 - Imene Romdhane, Heba Yuksel
:
A low-complexity security technique in physical layer for fixed LiFi communication systems. 102514 - Amir Mahdi Sazdar, Seyed Ali Ghorashi
, Vahideh Moghtadaiee
, Ahmad Khonsari, David Windridge
:
A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems. 102515 - Chen Wang, Andi Wang, Jian Xu
, Qiang Wang, Fucai Zhou:
Outsourced privacy-preserving decision tree classification service over encrypted data. 102517 - Mohammad Mogharen Askarin
, KokSheik Wong
, Raphaël C.-W. Phan:
Reduced contact lifting of latent fingerprints from curved surfaces. 102520 - Hong-xia Hou, Bo Yang, Mingrui Zhang, Yanwei Zhou, Meijuan Huang:
Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage. 102521 - Nasrollah Pakniat, Danial Shiraly, Ziba Eslami:
Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT. 102525 - Clemens Seibold
, Wojciech Samek, Anna Hilsmann, Peter Eisert:
Accurate and robust neural networks for face morphing attack detection. 102526 - Jigna J. Hathaliya, Sudeep Tanwar
, Richard Evans:
Securing electronic healthcare records: A mobile-based biometric authentication approach. 102528 - Naomi Okumura, Kazuhiro Ogata, Yoichi Shinoda:
Formal analysis of RFC 8120 authentication protocol for HTTP under different assumptions. 102529 - Mohammed Al Qurashi, Constantinos Marios Angelopoulos
, Vasilios Katos:
An architecture for resilient intrusion detection in ad-hoc networks. 102530 - Willy Susilo
, Joseph Tonien
, Guomin Yang
:
A generalised bound for the Wiener attack on RSA. 102531 - Gopal Singh Kushwah, Virender Ranga
:
Voting extreme learning machine based distributed denial of service attack detection in cloud computing. 102532 - Zeesha Mishra, Bibhudendra Acharya
:
High throughput and low area architectures of secure IoT algorithm for medical image encryption. 102533 - Hui Li:
Pseudo-random scalar multiplication based on group isomorphism. 102534 - Haibat Khan
, Keith M. Martin:
A survey of subscription privacy on the 5G radio interface - The past, present and future. 102537 - Venkatasamy Sureshkumar, Ruhul Amin, Mohammad S. Obaidat, Isswarya Karthikeyan:
An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. 102539
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.