


default search action
Journal of Information Security and Applications, Volume 72
Volume 72, February 2023
- Venkata Bhikshapathi Chenam
, Syed Taqi Ali
:
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment. 103377 - Harmanjeet Kaur, Nishtha Hooda
, Harpreet Singh:
k-anonymization of social network data using Neural Network and SVM: K-NeuroSVM. 103382 - Haotian Yin
:
Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model. 103385 - Junwei Zhou, Botian Lei, Huile Lang, Emmanouil Panaousis
, Kaitai Liang, Jianwen Xiang:
Secure genotype imputation using homomorphic encryption. 103386 - Zeyu Yang
, Ziqing Wang, Fei Qiu, Fagen Li
:
A group key agreement protocol based on ECDH and short signature. 103388 - Mahreen Saleem
, M. R. Warsi, Saiful Islam
:
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. 103389 - Gayathri R. Nayar
, Tony Thomas
:
Partial palm vein based biometric authentication. 103390 - Sandeep Bhowmik, Sriyankar Acharyya:
Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm. 103391 - Andrew McCarthy
, Essam Ghadafi, Panagiotis Andriotis
, Phil Legg
:
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. 103398 - Yajing Liu, Zhengya Sun, Wensheng Zhang:
Improving fraud detection via hierarchical attention-based Graph Neural Network. 103399 - Rajasekhar Chaganti, Vinayakumar Ravi
, Tuan D. Pham:
A multi-view feature fusion approach for effective malware classification using Deep Learning. 103402 - Kassem Bagher
, Shangqi Lai
:
SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud. 103403 - Saeed Javanmardi
, Mohammad Shojafar
, Reza Mohammadi
, Valerio Persico
, Antonio Pescapè:
S-FoS: A secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks. 103404 - Md. Alamin Talukder
, Khondokar Fida Hasan
, Md. Manowarul Islam
, Ashraf Uddin
, Arnisha Akhter
, Mohammad Abu Yousuf
, Fares Alharbi
, Mohammad Ali Moni
:
A dependable hybrid machine learning model for network intrusion detection. 103405 - Zhenzhen Guo, Gaoli Wang
, Orr Dunkelman, Yinxue Pan, Shengyuan Liu
:
Tweakable SM4: How to tweak SM4 into tweakable block ciphers? 103406 - R. Anushiadevi
, Rengarajan Amirtharajan
:
Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. 103407 - V. Sangavi, Palanivel Thangavel
:
An exquisite multiple image encryption harnessing multi-scroll Lu-Chen and Chua chaotic systems employing domino strategy. 103408 - Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Dianxin Wang
, Quanxin Zhang
, Yuanzhang Li:
Towards interpreting vulnerability of object detection models via adversarial distillation. 103410

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.