default search action
Journal of Information Security and Applications, Volume 84
Volume 84, 2024
- Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks. 103797 - Saurabh Agarwal, Ki-Hyun Jung:
Digital image steganalysis using entropy driven deep neural network. 103799 - Shuangcheng Li, Zhangguo Tang, Huanzhou Li, Jian Zhang, Han Wang, Junfeng Wang:
GMADV: An android malware variant generation and classification adversarial training framework. 103800 - Shuanggen Liu, Yingzi Hu, Xu An Wang, Xukai Liu, Yuqing Yin, Teng Wang:
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing. 103803 - Sharad Joshi, Suraj Saxena, Nitin Khanna:
Source printer identification from document images acquired using smartphone. 103804 - Lieyu Lv, Ling Xiong, Fagen Li:
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption. 103805 - Amit Kumar Roy, Varadarajan Vijayakumar, Keshab Nath:
Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks. 103806 - Yuming Liu, Yong Wang, Hao Feng:
A novel link fabrication attack detection method for low-latency SDN networks. 103807 - Zongye Zhang, Fucai Zhou, Ruiwei Hou:
Privacy-preserving geo-tagged image search in edge-cloud computing for IoT. 103808 - Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
A comprehensive evaluation on the benefits of context based password cracking for digital forensics. 103809 - Gao Wang, Gaoli Wang:
Keeping classical distinguisher and neural distinguisher in balance. 103816 - Jacques Bou Abdo, Sherali Zeadally:
Disposable identities: Solving web tracking. 103821 - Chao Ma, Haiying Gao, Bin Hu:
Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices. 103822 - Yaser Baseri, Abdelhakim Hafid, Mahdi Daghmehchi Firoozjaei, Soumaya Cherkaoui, Indrakshi Ray:
Statistical privacy protection for secure data access control in cloud. 103823 - Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic:
Specifying cycles of minimal length for commonly used linear layers in block ciphers. 103824 - Xiangling Ding, Yingqian Deng, Yulin Zhao, Wenyi Zhu:
AFTLNet: An efficient adaptive forgery traces learning network for deep image inpainting localization. 103825 - Vivek Dabra, Saru Kumari, Anju Bala, Sonam Yadav:
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world. 103826 - Shaoqian Wu, Wei Wang, Zhanmeng Ding:
Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection. 103827 - David Garcia Rosado, Luis Enrique Sánchez, Ángel Jesús Varela-Vaca, Antonio Santos-Olmo, María Teresa Gómez-López, Rafael M. Gasca, Eduardo Fernández-Medina:
Enabling security risk assessment and management for business process models. 103829 - Girraj Kumar Verma, Nahida Majeed Wani, Saurabh Rana, Neeraj Kumar, Asheesh Tiwari:
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles. 103830 - Yaolin Yang, Fan Chen, Heng-Ming Tai, Hongjie He, Lingfeng Qu:
Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding. 103833
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.