


default search action
Journal of Information Security and Applications, Volume 76
Volume 76, August 2023
- Saher Tegane, Fouzi Semchedine
, Abdelmalek Boudries
:
An extended Attribute-based access control with controlled delegation in IoT. 103473 - Hassan N. Noura
, Ola Salman, Ali Chehab
:
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms. 103514 - Mahdi Soltani
, Behzad Ousat
, Mahdi Jafari Siavoshani, Amir Hossein Jahangir
:
An adaptable deep learning-based intrusion detection system to zero-day attacks. 103516 - Johannes Schneider, Frank Breitinger
:
Towards AI forensics: Did the artificial intelligence system do it? 103517 - Yanrong Liang, Yanping Li, Kai Zhang, Zhenqiang Wu
:
VMSE: Verifiable multi-keyword searchable encryption in multi-user setting supporting keywords updating. 103518 - Han Xu
, Priyadarsi Nanda, Jie Liang, Xiangjian He
:
FCH, an incentive framework for data-owner dominated federated learning. 103521 - Mahdi Nikooghadam, Hamid Reza Shahriari, Saeid Tousi Saeidi:
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment. 103523 - Bo Zhang
, Helei Cui
, Xiaoning Liu, Yaxing Chen
, Zhiwen Yu, Bin Guo:
Decentralized and secure deduplication with dynamic ownership in MLaaS. 103524 - Mariia Bakhtina
, Raimundas Matulevicius
, Mari Seeba
:
Tool-supported method for privacy analysis of a business process model. 103525 - Chenlu Xie, Runhua Shi
, XiaoXu Zhang, Pengbo Wang, Wanpeng Guo:
Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments. 103526 - Tengfei Tu
, Hua Zhang
, Yangye Hu, Dong Cui, Xilin Zhai:
A detector for Android repackaged applications with layout-fingerprint. 103527 - Jianxiang Qi, Ning Zheng, Ming Xu
, Xiaodong Wang, Yunzhi Chen
:
A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks. 103528 - Siyu Yao, Yizhi Ren, Dong Wang, Yeru Wang, Weifeng Yin, Lifeng Yuan
:
SNN-PPRL: A secure record matching scheme based on siamese neural network. 103529 - Terry Shue Chien Lau
, Fedor Ivanov, Muhammad Rezal Kamel Ariffin, Ji-Jian Chin
, Timothy Tzen Vun Yap
:
New code-based cryptosystems via the IKKR framework. 103530 - Weijian Teng
, Je Sen Teh
, Norziana Jamil
:
On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM. 103531 - Mengnan Gao
, Lifa Wu
, Qi Li, Wei Chen
:
Anomaly traffic detection in IoT security using graph neural networks. 103532 - Khalil Hariss, Hassan N. Noura
:
Homomorphic additive lightweight block cipher scheme for securing IoT applications. 103540 - J. Hemalatha
, Sekar Mohan
, Chandan Kumar
, Adnan Gutub
, Aditya Kumar Sahu:
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier. 103541 - Qiuyu Zhang, Minrui Fu, Zhenyu Zhao, Yibo Huang:
Searchable encryption over encrypted speech retrieval scheme in cloud storage. 103542 - Shen Hou
, Yanzhou Ma, Ding Deng
, Zhenyu Wang
, Guolei Ren:
Modeling and physical attack resistant authentication protocol with double PUFs. 103543 - Cheonshik Kim, Ching-Nung Yang
, Zhili Zhou
, Ki-Hyun Jung
:
Dual efficient reversible data hiding using Hamming code and OPAP. 103544 - Arun Kumar Rai, Hari Om, Satish Chand, Saurabh Agarwal
:
Reversible data hiding in encrypted image using two-pass pixel value ordering. 103545 - Chao Chen
, Fangguo Zhang
, Changan Zhao:
Isogeny computation on Kummer lines and applications. 103546 - Zongwei Tang
, Xiuli Chai, Yang Lu, Binjie Wang, Yong Tan:
An end-to-end screen shooting resilient blind watermarking scheme for medical images. 103547 - Li Li, Yu Bai, Ching-Chun Chang, Yunyuan Fan, Wei Gu, Mahmoud Emam
:
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders. 103548 - Surbhi Shaw
, Ratna Dutta:
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things. 103549 - Mengjuan Liu
, Jiang Liu, Chenyang Liu
, Kuo-Hui Yeh
:
A task-oriented neural dialogue system capable of knowledge accessing. 103551 - Tamara Finogina, Javier Herranz
:
On remote electronic voting with both coercion resistance and cast-as-intended verifiability. 103554

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.