default search action
Journal of Information Security and Applications, Volume 55
Volume 55, December 2020
- Mohsen Yoosefi Nejad, Mohammad Mosleh, Saeed Rasouli Heikalabad:
A blind quantum audio watermarking based on quantum discrete cosine transform. 102495 - Hongxia Zhang, Xingshu Chen, Xiao Lan, Hongjian Jin, Qi Cao:
BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme. 102538 - Zhanwen Chen, Jiageng Chen, Weizhi Meng, Je Sen Teh, Pei Li, Bingqing Ren:
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU. 102565 - Shahab Shamshirband, Mahdis Fathi, Anthony T. Chronopoulos, Antonio Montieri, Fabio Palumbo, Antonio Pescapè:
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. 102582 - Mohil Maheshkumar Patel, Sudeep Tanwar, Rajesh Gupta, Neeraj Kumar:
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions. 102583 - Muhammad Faizan Ayub, Muhammad Asad Saleem, Izwa Altaf, Khalid Mahmood, Saru Kumari:
Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device. 102585 - Salman Shamshad, Minahil Rana, Khalid Mahmood, Saru Kumari, Chien-Ming Chen:
A secure blockchain-based e-health records storage and sharing scheme. 102590 - Wenjuan Li, Yu Wang, Jin Li, Yang Xiang:
Toward supervised shape-based behavioral authentication on smartphones. 102591 - Naoufal Rtayli, Nourddine Enneya:
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization. 102596 - Edoukou Berenger Ayebie, El Mamoun Souidi:
Rank-metric code-based mutual authentication protocol for RFID. 102598 - Arjun Singh Rawat, Maroti Deshmukh:
Tree and elliptic curve based efficient and secure group key agreement protocol. 102599 - Gagandeep Kaur:
A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment. 102601 - Tushar Kanti Saha, Deevashwer Rathee, Takeshi Koshiba:
Efficient protocols for private wildcards pattern matching. 102609 - Ahmed Aleroud, Emad Abu-Shanab, Ahmad Al-Aiad, Yazan Alshboul:
An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities. 102614 - Hasan Ali Khattak, Komal Tehreem, Ahmad Almogren, Zoobia Ameer, Ikram Ud Din, Muhammad Adnan:
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities. 102615 - Amartya Sen, Sanjay Madria:
Application design phase risk assessment framework using cloud security domains. 102617 - Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagraa, Mohamed Amine Ferrag:
Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey. 102618 - Nivio Paula de Souza, Cecília de Azevedo Castro César, Juliana de Melo Bezerra, Celso Massaki Hirata:
Extending STPA with STRIDE to identify cybersecurity loss scenarios. 102620 - Jisa David, Ciza Thomas:
Detection of distributed denial of service attacks based on information theoretic approach in time series models. 102621 - Kamlesh Kumar Raghuvanshi, Subodh Kumar, Sunil Kumar:
A data encryption model based on intertwining logistic map. 102622 - Satyabrata Roy, Rohit Kumar Gupta, Umashankar Rawat, Nilanjan Dey, Rubén González Crespo:
PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications. 102624 - V. Sangavi, P. Thangavel:
An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler system and Sine map. 102626 - Cyrielle Feron, Loïc Lagadec, Vianney Lapôtre:
Automated exploration of homomorphic encryption scheme input parameters. 102627 - Xiao-di Wang, Weizhi Meng, Yi-Ning Liu:
Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid. 102628 - Xiaoyu Zhou, Wien Hong, Shaowei Weng, Tung-Shou Chen, Jeanne Chen:
Reversible and recoverable authentication method for demosaiced images using adaptive coding technique. 102629 - Luca Calderoni, Samantha Bandini, Dario Maio:
Privacy preservation in outsourced mobility traces through compact data structures. 102630 - Amir Jalaly Bidgoly:
Robustness verification of soft security systems. 102632 - Xingxing Xiong, Shubo Liu, Dan Li, Zhaohui Cai, Xiaoguang Niu:
Real-time and private spatio-temporal data aggregation with local differential privacy. 102633 - Matteo Francia, Enrico Gallinucci, Matteo Golfarelli, Nicola Santolini:
DART: De-Anonymization of personal gazetteers through social trajectories. 102634 - Lama Sleem, Hassan N. Noura, Raphaël Couturier:
Towards a secure ITS: Overview, challenges and solutions. 102637 - Inam ul Haq, Jian Wang, Youwen Zhu, Saad Maqbool:
A survey of authenticated key agreement protocols for multi-server architecture. 102639 - Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars:
Applied graph theory to security: A qualitative placement of security solutions within IoT networks. 102640 - Stephen B. Wicker:
eBook surveillance and the threat to freedom of association. 102643 - Fatma Masmoudi, Zakaria Maamar, Mohamed Sellami, Ali Ismail Awad, Vanilson Arruda Burégio:
A Guiding Framework for Vetting the Internet of Things. 102644 - Fatemeh Faraji Daneshgar, Maghsoud Abbaspour:
A two-phase sequential pattern mining framework to detect stealthy P2P botnets. 102645 - S. H. Kok, Azween B. Abdullah, N. Z. Jhanjhi:
Evaluation metric for crypto-ransomware detection using machine learning. 102646 - Ili Ko, Desmond Chambers, Enda Barrett:
Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation. 102647 - Dheerendra Mishra, Dharminder Dharminder, Preeti Yadav, Y. Sreenivasa Rao, Pandi Vijayakumar, Neeraj Kumar:
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party. 102648 - Ye Tao, Wenhua Cui, Zhao Zhang:
Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm. 102650 - Mimi Ma, Shuqin Fan, Dengguo Feng:
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine. 102652 - Indu Singh, Narendra Kumar, Srinivasa K. G., Tript Sharma, Vaibhav Kumar, Siddharth Singhal:
Database intrusion detection using role and user behavior based risk assessment. 102654 - Huifang Yu, Wen Li:
A certificateless signature for multi-source network coding. 102655 - Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li:
A bandwidth efficient HMAC-based authentication scheme for network coding. 102658 - Jing Zhang, Rong Tan, Chunhua Su, Wen Si:
Design and application of a personal credit information sharing platform based on consortium blockchain. 102659 - Ching-Nung Yang, Yi-Chin Lin, Peng Li:
Cheating immune k-out-of-n block-based progressive visual cryptography. 102660 - Xianwei Gao, Changzhen Hu, Chun Shan, Baoxu Liu, Zequn Niu, Hui Xie:
Malware classification for the cloud via semi-supervised transfer learning. 102661 - Ashish Kumar, Rahul Saha, Mamoun Alazab, Gulshan Kumar:
A Lightweight Signcryption Method for Perception Layer in Internet-of-Things. 102662 - Bolin Chen, Weiqi Luo, Peijia Zheng, Jiwu Huang:
Universal stego post-processing for enhancing image steganography. 102664 - Mriganka Mandal:
Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption. 102666 - Routa Moussaileb, Renzo E. Navas, Nora Cuppens:
Watch out! Doxware on the way... 102668 - Samra Bouakkaz, Fouzi Semchedine:
A certificateless ring signature scheme with batch verification for applications in VANET. 102669 - Rupa Ch., Gautam Srivastava, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Sweta Bhattacharya:
Security and privacy of UAV data using blockchain technology. 102670 - Hussam S. Alhadawi, Dragan Lambic, Mohamad Fadli Zolkipli, Musheer Ahmad:
Globalized firefly algorithm and chaos for designing substitution box. 102671
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.