


default search action
Journal of Information Security and Applications, Volume 78
Volume 78, November 2023
- Rajeev Kumar
, Deepak Sharma
, Amit Dua
, Ki-Hyun Jung
:
A review of different prediction methods for reversible data hiding. 103572 - Mateusz Stepniak, Jakub Mielczarek
:
Analysis of multiple overlapping paths algorithms for secure key exchange in large-scale quantum networks. 103581 - Mriganka Mandal
, Ramprasad Sarkar:
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission. 103584 - Sreeparna Ganguly
, Imon Mukherjee
, Ashutosh Pati
:
Stegano-Purge: An integer wavelet transformation based adaptive universal image sterilizer for steganography removal. 103586 - Basar Koc
, Ziya Arnavut
, Hüseyin Koçak:
Concurrent encryption and lossless compression using inversion ranks. 103587 - Shufen Niu, Qi Liu, Wei Liu, Runyuan Dong, Peng Ge:
Multi-party anonymous authentication scheme in heterogeneous network slicing. 103589 - Abid Mehmood
, Arslan Shafique
, Shehzad Ashraf Chaudhry, Moatsum Alawida, Abdul Nasir Khan
, Neeraj Kumar:
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption. 103590 - Zhanwei Yuan, Shufeng Huang
, Linqing Huang, Yuxiao Du, Shuting Cai, Xiaoming Xiong:
Safe-LBP: A visually meaningful image encryption scheme based on LBP and compressive sensing. 103591 - Qingxin Sheng, Chong Fu, Zhaonan Lin, Ming Tie, Junxin Chen, Chiu-Wing Sham
:
A one-time-pad-like chaotic image encryption scheme using data steganography. 103592 - Ravishankar Mehta
, Sindhuja Shukla, Jitesh Pradhan, Koushlendra Kumar Singh, Abhinav Kumar:
A vision transformer-based automated human identification using ear biometrics. 103599 - Guangwei Xu
, Wenrui Ji
, Yan Wang, Xiujin Shi
, Qiubo Huang, Yanglan Gan
:
Searchable encryption algorithm based on key aggregation of multiple data owners in data sharing. 103600 - Jie Chen
, Haodi Zhang
, Shuai Wang, Huamin Jin:
A secure recharge scheme for blockchain payment channels. 103603 - Nan Yang, Youliang Tian
, Zhou Zhou, Qijia Zhang
:
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU. 103604 - Bin Ma, Kaixin Du
, Jian Xu, Chunpeng Wang
, Jian Li, Linna Zhou:
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition. 103605 - Lianming Zhang
, Kui Liu, Xiaowei Xie, Wenji Bai, Baolin Wu, Pingping Dong
:
A data-driven network intrusion detection system using feature selection and deep learning. 103606 - Subhabrata Rana
, Fatemeh Khoda Parast
, Brett Kelly, Yang Wang
, Kenneth B. Kent
:
A comprehensive survey of cryptography key management systems. 103607 - Sreekanth Vadigi
, Kamalakanta Sethi, Dinesh Mohanty, Shom Prasad Das, Padmalochan Bera:
Federated reinforcement learning based intrusion detection system using dynamic attention mechanism. 103608 - Meenakshi Mittal
, Krishan Kumar, Sunny Behal
:
DL-2P-DDoSADF: Deep learning-based two-phase DDoS attack detection framework. 103609 - Yazhou Wang
, Bing Li, Yan Zhang
, Jiaxin Wu, Guozhu Liu, Yuqi Li, Zhen Mao:
A novel blockchain's private key generation mechanism based on facial biometrics and physical unclonable function. 103610 - Carlo Blundo
, Stelvio Cimato
:
Role mining under User-Distribution cardinality constraint. 103611 - Sourabh Debnath
, Ramesh Kumar Mohapatra
, Ratnakar Dash:
Secret data sharing through coverless video steganography based on bit plane segmentation. 103612 - Yefan Wang, Jiale Chen, Jun Wang
:
Visually meaningful image encryption based on 2D compressive sensing and dynamic embedding. 103613 - Ahmed S. Shatnawi
, Mahmoud M. Almazari
, Zakarea AlShara, Eyad Taqieddin
, Dheya Mustafa
:
RSA cryptanalysis - Fermat factorization exact bound and the role of integer sequences in factorization problem. 103614 - Changsong Jiang
, Chunxiang Xu, Chenchen Cao, Kefei Chen:
GAIN: Decentralized Privacy-Preserving Federated Learning. 103615 - Qinglong Wang
, YongYong Li, Zhiqiang Tan, Na Fan, GuDi Yao:
Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms. 103616 - Hayyan Hasan, Behrouz Tork Ladani
, Bahman Zamani
:
Maaker: A framework for detecting and defeating evasion techniques in Android malware. 103617 - Md. Amirul Islam, Ashraf Uddin
, Sunil Aryal, Giovanni Stea
:
An ensemble learning approach for anomaly detection in credit card data with imbalanced and overlapped classes. 103618 - Xiaofan Xia, Songsong Zhang, Kunshu Wang, Tiegang Gao:
A novel color image tampering detection and self-recovery based on fragile watermarking. 103619 - Binjie Liao
, Hongyi Chen, Yu Wang
, Weizhi Meng
, Jun Zhang:
Analysis of hybrid attack and defense based on block withholding strategy. 103620 - Fei Yan
, Nianqiao Li, Abdullah M. Iliyasu
, Ahmed S. Salama, Kaoru Hirota
:
Insights into security and privacy issues in smart healthcare systems based on medical images. 103621 - Juan Manuel Espín López
, Alberto Huertas Celdrán
, Francisco Esquembre
, Gregorio Martínez Pérez
, Javier G. Marín-Blázquez
:
CGAPP: A continuous group authentication privacy-preserving platform for industrial scene. 103622 - Tapaswini Mohanty, Sumit Kumar Debnath
:
An information-theoretically secure quantum multiparty private set intersection. 103623 - Olson Italis
, Samuel Pierre, Alejandro Quintero
:
Privacy-preserving model for biometric-based authentication and Key Derivation Function. 103624 - Ren-Hung Hwang
, Chieh-Lun Lee, Ying-Dar Lin, Po-Ching Lin
, Hsiao-Kuang Wu
, Yuan-Cheng Lai
, Chung-Kuan Chen
:
Host-based intrusion detection with multi-datasource and deep learning. 103625 - Mandira Banik
, Sanjay Kumar
:
Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment. 103626

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.