


default search action
Journal of Information Security and Applications, Volume 65
Volume 65, March 2022
- Amirhossein Adavoudi Jolfaei, Hamid Mala, Maryam Zarezadeh:
EO-PSI-CA: Efficient outsourced private set intersection cardinality. 102996 - Zhenjie Huang
, Zhiwei Lin:
Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems. 103066 - Xuemei Bai, Yong Chen, Gangpeng Duan, Chao Feng, Wanli Zhang:
A data hiding scheme based on the difference of image interpolation algorithms. 103068 - Biwen Chen
, Xue Li
, Tao Xiang
, Peng Wang:
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability. 103082 - Masahito Ishizaka, Shinsaku Kiyomoto:
Multi-dimensional sub/super-range signatures. 103084 - Jianghan Mao, Chenyu Wang, Yanhui Guo, Guoai Xu, Shoufeng Cao, Xuanwen Zhang, Zixiang Bi
:
A novel model for voice command fingerprinting using deep learning. 103085 - Wei-Zhu Yeoh
, Je Sen Teh
, Jiageng Chen:
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework. 103087 - Xiao Li
, Yuanhai Chang, Guixin Ye
, Xiaoqing Gong, Zhanyong Tang
:
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program. 103088 - Amit Praseed
, P. Santhi Thilagam
:
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach. 103090 - Jaimandeep Singh
, Naveen Kumar Chaudhary:
OAuth 2.0 : Architectural design augmentation for mitigation of common security vulnerabilities. 103091 - Yi-Wei Ma, Jiann-Liang Chen, Wen-Han Kuo, Yu-Chen Chen:
[email protected]: An intelligent framework for defending against malware attacks. 103092 - Fagen Song, Tinghuai Ma:
A location privacy protection method in spatial crowdsourcing. 103095 - Noor Ul Ain Ali, Waseem Iqbal
, Hammad Afzal
:
Carving of the OOXML document from volatile memory using unsupervised learning techniques. 103096 - Amir Sharif
, Roberto Carbone, Giada Sciarretta, Silvio Ranise
:
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients. 103097 - Chong Yuan
, Jingxuan Cai
, Donghai Tian
, Rui Ma, Xiaoqi Jia, Wenmao Liu:
Towards time evolved malware identification using two-head neural network. 103098 - Jin Hoki, Takanori Isobe, Ryoma Ito
, Fukang Liu, Kosei Sakamoto:
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi. 103100 - Mohammad Ali
, Mohammadreza Sadeghi, Ximeng Liu, Yinbin Miao, Athanasios V. Vasilakos
:
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things. 103101 - Yirang Lim, MinA Youn
, Hyunji Chung, Jungheum Park
, Graeme Horsman, Sangjin Lee:
Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics. 103102 - Xiaohan Yue, Shuaishuai Zeng, Xibo Wang, Lixin Yang, Shi Bai, Yuan He
:
A practical privacy-preserving communication scheme for CAMs in C-ITS. 103103 - Xiangyang Wang, Xin Shen, Jia-lin Tian, Pan-pan Niu, Hongying Yang:
Locally optimum image watermark detector based on statistical modeling of SWT-EFMs magnitudes. 103105 - Jian Gao
, Zhi Li, Bin Fan
:
An efficient robust zero watermarking scheme for diffusion tensor-Magnetic resonance imaging high-dimensional data. 103106 - Ayei E. Ibor
, Olusoji B. Okunoye, Florence A. Oladeji, Khadeejah A. Abdulsalam:
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems' Communication Networks based on Bio-inspired Deep Neural Network Structure. 103107 - Yang Yang
, Jianguo Sun, Zechao Liu, Yuqing Qiao:
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing. 103108 - Munmun Bhattacharya
, Sandip Roy, Ashok Kumar Das
, Samiran Chattopadhyay
, Soumya Banerjee
, Ankush Mitra:
DDoS attack resisting authentication protocol for mobile based online social network applications. 103115 - Jung-San Lee, Chit-Jie Chew, Jo-Yun Liu, Ying-Chin Chen, Kuo-Yu Tsai:
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract. 103117 - Carlos Blanco
, Diego García-Saiz
, David Garcia Rosado, Antonio Santos-Olmo
, Jesús Peral
, Alejandro Maté, Juan Trujillo, Eduardo Fernández-Medina:
Security policies by design in NoSQL document databases. 103120 - Pulei Xiong
, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a robust and trustworthy machine learning system development: An engineering perspective. 103121 - Rasim M. Alguliyev
, Fargana J. Abdullayeva
, Sabira S. Ojagverdiyeva
:
Image-based malicious Internet content filtering method for child protection. 103123 - ZengRi Zeng
, Wei Peng, Detian Zeng, Chong Zeng, Yifan Chen:
Intrusion detection framework based on causal reasoning for DDoS. 103124 - Thomas Nagunwa, Paul Kearney
, Shereen Fouad
:
A machine learning approach for detecting fast flux phishing hostnames. 103125 - Ku-Sung Hsieh
, Chung-Ming Wang:
Constructive image steganography using example-based weighted color transfer. 103126

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.