default search action
Journal of Information Security and Applications, Volume 59
Volume 59, June 2021
- Moitrayee Chatterjee, Akbar Siami Namin:
A fuzzy Dempster-Shafer classifier for detecting Web spams. 102793 - Vasileios Syrris, Dimitris Geneiatakis:
On machine learning effectiveness for malware detection in Android OS using static analysis data. 102794 - Luca Calderoni, Paolo Palmieri, Constantinos Patsakis:
Introduction to the special issue on privacy and security for location-based services and devices. 102800 - Merzougui Salah Eddine, Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras:
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles. 102802 - Faraz Ahmad Khan, Ahmed Bouridane, Said Boussakta, Richard Jiang, Somaya Almaadeed:
Secure facial recognition in the encrypted domain using a local ternary pattern approach. 102810 - Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar:
Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under imperfect CSI. 102812 - Carmen Bisogni, Gerardo Iovane, Riccardo Emanuele Landi, Michele Nappi:
ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions. 102814 - Somnath Panja, Bimal Roy:
A secure end-to-end verifiable e-voting system using blockchain and cloud server. 102815 - Tian-Fu Lee, Wei-Yu Chen:
Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things. 102817 - Arpita Patidar, Gaurav Somani:
Serving while attacked: DDoS attack effect minimization using page separation and container allocation strategy. 102818 - Xiaochao Wang, Ding Ma, Kun Hu, Jianping Hu, Ling Du:
Mapping based Residual Convolution Neural Network for Non-embedding and Blind Image Watermarking. 102820 - Peng Chen, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li, Arcangelo Castiglione:
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement. 102821 - Bingfeng Xu, Gaofeng He, Haiting Zhu:
ME-Box: A reliable method to detect malicious encrypted traffic. 102823 - Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Searchable encryption using secret sharing scheme that realizes direct search of encrypted documents and disjunctive search of multiple keywords. 102824 - Ahad Niknia, Miguel Correia, Jaber Karimpour:
Secure cloud-of-clouds storage with space-efficient secret sharing. 102826 - Adel Abusitta, Miles Q. Li, Benjamin C. M. Fung:
Malware classification and composition analysis: A survey of recent developments. 102828 - Yasir Naseer, Tariq Shah, Dawood Shah:
A novel hybrid permutation substitution base colored image encryption scheme for multimedia data. 102829 - Tolun Tosun, Erkay Savas:
FSDS: A practical and fully secure document similarity search over encrypted data with lightweight client. 102830 - Saira Jahangir, Tariq Shah:
A novel multiple color image encryption scheme based on algebra M(2, F2[u]/〈u8〉) and chaotic map. 102831 - T. Janani, M. Brindha:
A secure medical image transmission scheme aided by quantum representation. 102832 - Mauro Alberto Brignoli, Alessio P. Caforio, Francesco Caturano, Maurizio D'Arienzo, Marco Latini, Walter Matta, Simon Pietro Romano, B. Ruggiero:
A distributed security tomography framework to assess the exposure of ICT infrastructures to network threats. 102833 - Himanshu Agarwal, Farooq Husain:
Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF. 102846 - Luca Ferretti, Francesco Longo, Giovanni Merlino, Michele Colajanni, Antonio Puliafito, Nachiket Tapas:
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things. 102848 - Chun-I Fan, Arijit Karati, Pei-Shan Yang:
Reliable file transfer protocol with producer anonymity for Named Data Networking. 102851 - Ömer Kasim:
An ensemble classification-based approach to detect attack level of SQL injections. 102852 - Siliang Hua, Huiguo Zhang, Jingya Zhang, Shuchang Wang:
Optimization and implementation of the number theoretic transform butterfly unit for large integer multiplication. 102857 - Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Bit-wise cryptanalysis on AND-RX permutation Friet-PC. 102860 - Yanzhen Ren, Sen Cai, Lina Wang:
Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD). 102863 - Kashif Naseer Qureshi, Adi Alhudhaif, Adeel Abass Shah, Saqib Majeed, Gwanggil Jeon:
Trust and priority-based drone assisted routing and mobility and service-oriented solution for the internet of vehicles networks. 102864
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.