![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 58
Volume 58, May 2021
- Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Chien-Ming Chen
, Saru Kumari
:
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). 102625 - Antoine Boutet, Mathieu Cunche:
Privacy protection for Wi-Fi location positioning systems. 102635 - Zhuoqun Xia, Zhenwei Fang, Ke Gu
, Jin Wang, Jingjing Tan, Guanghui Wang:
Effective charging identity authentication scheme based on fog computing in V2G networks. 102649 - Yanbin Zhang
, Ke Cheng
, Fazlullah Khan
, Ryan Alturki
, Rahim Khan
, Ateeq Ur Rehman
:
A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities. 102683 - Bakkiam David Deebak, Fadi M. Al-Turjman
:
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems. 102689 - Michele La Manna
, Pericle Perazzo
, Gianluca Dini:
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks. 102692 - Yen-Lung Lai
, Minyi Li
, Shiuan-Ni Liang
, Zhe Jin
:
Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources. 102695 - Akshay Mathur, Laxmi Mounika Podila
, Keyur Kulkarni, Quamar Niyaz, Ahmad Y. Javaid
:
NATICUSdroid: A malware detection framework for Android using native and custom permissions. 102696 - Yanli Ren
, Xiangyu Li, Shifeng Sun, Xingliang Yuan, Xinpeng Zhang:
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. 102698 - Rui Wang, Guoqiang Deng
, Xue-Feng Duan:
An image encryption scheme based on double chaotic cyclic shift and Josephus problem. 102699 - Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh:
Simple and scalable blockchain with privacy. 102700 - Xiaofeng Chen, Chaoqun Hong:
An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction. 102702 - Shilpee Prasad, B. R. Purushothama:
CCA secure and efficient proxy re-encryption scheme without bilinear pairing. 102703 - Wencheng Yang, Song Wang
, Muhammad Shahzad, Wei Zhou:
A cancelable biometric authentication system based on feature-adaptive random projection. 102704 - Izza Sarah
, Mustapha Benssalah, Karim Drouiche:
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. 102705 - M. Vijay
, G. Indumathi:
Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications. 102707 - Zi-Yuan Liu
, Yi-Fan Tseng
, Raylin Tso
, Masahiro Mambo:
Designated-ciphertext searchable encryption. 102709 - Jan Sher Khan
, Sema Koç Kayhan:
Chaos and compressive sensing based novel image encryption scheme. 102711 - Gustavo Gonzalez Granadillo
, Mario Faiella, Ibéria Medeiros
, Rui Azevedo, Susana Gonzalez Zarzosa
:
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities. 102715 - Eirini Anthi
, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury:
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems. 102717 - Stuart Millar, Niall McLaughlin
, Jesús Martínez del Rincón
, Paul Miller:
Multi-view deep learning for zero-day Android malware detection. 102718 - Peng-Cheng Huang, Chinchen Chang, Yung-Hui Li, Yanjun Liu:
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism. 102719 - Ehsan Farzadnia
, Hossein Shirazi, Alireza Nowroozi
:
A novel sophisticated hybrid method for intrusion detection using the artificial immune system. 102721 - Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Quanrun Li:
Design of ideal secret sharing based on new results on representable quadripartite matroids. 102724 - Constantinos Patsakis, Fran Casino:
Exploiting statistical and structural features for the detection of Domain Generation Algorithms. 102725 - Shaikha Hasan, Mazen Ali, Sherah Kurnia, Ramayah Thurasamy
:
Evaluating the cyber security readiness of organizations and its influence on performance. 102726 - Ruhul Amin, Isha Pali
, Venkatasamy Sureshkumar
:
Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs. 102729 - Sumit Kumar Debnath, Tanmay Choudhury, Nibedita Kundu, Kunal Dey:
Post-quantum secure multi-party private set-intersection in star network topology. 102731 - Zhaoning You, Yan Liu, Tiegang Gao:
A lossless self-recovery watermarking scheme with JPEG-LS compression. 102733 - Roop Singh, Alaknanda Ashok
:
An optimized robust watermarking technique using CKGSA in frequency domain. 102734 - Wadi' Hijawi, Ja'far Alqatawna, Ala' M. Al-Zoubi, Mohammad A. Hassonah, Hossam Faris:
Android botnet detection using machine learning models based on a comprehensive static analysis approach. 102735 - Kamalesh Acharya
, Ratna Dutta:
Constructing provable secure broadcast encryption scheme with dealership. 102736 - Yu Zhou, Xinfeng Dong, Yongzhuang Wei:
On the transparency order relationships between one Boolean function and its decomposition functions. 102738 - Dawid Polap
, Gautam Srivastava
, Keping Yu
:
Agent architecture of an intelligent medical system based on federated learning and blockchain technology. 102748 - Bakkiam David Deebak, Fadi M. Al-Turjman
:
Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements. 102749 - O. S. Jannath Nisha, Somasundaram Mary Saira Bhanu:
Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment. 102751 - Christoforos Ntantogian, Panagiotis Bountakas
, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis
:
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation. 102752 - K. Sowjanya
, Mou Dasgupta
, Sangram Ray:
Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things. 102761 - Yanbin Li, Yu Liu
, Yongheng Dai, Pengda Wang:
A party-adaptive variant of LowGear. 102763 - Jay Shah
, Sarthak Agarwal
, Arpit Shukla
, Sudeep Tanwar
, Sudhanshu Tyagi, Neeraj Kumar
:
Blockchain-based scheme for the mobile number portability. 102764 - Sejal Gupta
, Ritu Garg
, Nitin Gupta
, Waleed S. Alnumay
, Uttam Ghosh
, Pradip Kumar Sharma
:
Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks. 102768 - Muhammad Asad Saleem, SK Hafizul Islam
, Shafiq Ahmed
, Khalid Mahmood, Majid Hussain:
Provably secure biometric-based client-server secure communication over unreliable networks. 102769 - Asma Chaouch, Laurent-Stéphane Didier, Fangan-Yssouf Dosso, Nadia El Mrabet
, Belgacem Bouallegue, Bouraoui Ouni:
Two hardware implementations for modular multiplication in the AMNS: Sequential and semi-parallel. 102770 - Mengji Chen, Taj Malook, Ateeq Ur Rehman
, Yar Muhammad, Mohammad Dahman Alshehri, Aamir Akbar
, Muhammad Bilal
, Muazzam Ali Khan:
Blockchain-Enabled healthcare system for detection of diabetes. 102771 - André Lizardo, Raul Barbosa, Samuel Neves
, Jaime Correia, Filipe Araújo
:
End-to-end secure group communication for the Internet of Things. 102772 - Debasis Gountia
, Sudip Roy
:
Security model for protecting intellectual property of state-of-the-art microfluidic biochips. 102773 - Amal Gassara, Ismael Bouassida Rodriguez:
Describing correct UAVs cooperation architectures applied on an anti-terrorism scenario. 102775 - Nibedita Kundu, Sumit Kumar Debnath, Dheerendra Mishra:
A secure and efficient group signature scheme based on multivariate public key cryptography. 102776 - Luigi Logrippo:
Multi-level models for data security in networks and in the Internet of things. 102778 - Bechir Alaya, Lamaa Sellami:
Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks. 102779 - Jiahui Chen
, Wensheng Gan
, Muchuang Hu, Chien-Ming Chen
:
On the construction of a post-quantum blockchain for smart city. 102780 - Hassan N. Noura
, Reem Melki
, Ali Chehab
:
Efficient data confidentiality scheme for 5G wireless NOMA communications. 102781 - Nimish Mishra
, SK Hafizul Islam
, Sherali Zeadally:
A comprehensive review on collision-resistant hash functions on lattices. 102782 - Ying Li, Jiaxing Cheng, Cheng Huang
, Zhouguo Chen, Weina Niu:
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums. 102784 - Soufiane Sail, Roberto Magán-Carrión, Inmaculada Medina-Bulo, Halima Bouden:
Preserving authentication and availability security services through Multivariate Statistical Network Monitoring. 102785 - Damandeep Kaur, Devender Kumar:
Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. 102787 - Kübra Seyhan
, Tu N. Nguyen
, Sedat Akleylek
, Korhan Cengiz
, SK Hafizul Islam:
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security. 102788 - Rahul Sharma
, Mohammad Wazid, Prosanta Gope:
A blockchain based secure communication framework for community interaction. 102790 - Haiyu Li
, Tao Wang
, Zirui Qiao, Bo Yang, Yueyang Gong, Jingyi Wang, Guoyong Qiu:
Blockchain-based searchable encryption with efficient result verification and fair payment. 102791 - Lingling Lv
, Zhipeng Yang, Lei Zhang
, Quanzhen Huang, Zhihong Tian:
Multi-party transaction framework for drone services based on alliance blockchain in smart cities. 102792 - Shiyue Qin, Zhenhua Tan
, Bin Zhang, Fucai Zhou:
Distributed secret sharing scheme based on the high-dimensional rotation paraboloid. 102797 - Firas Hazzaa
, Antesar M. Shabut, Nada Hussein M. Ali, Marcian N. Cirstea:
Security Scheme Enhancement for Voice over Wireless Networks. 102798 - Gaurav Pareek, B. R. Purushothama:
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets. 102799 - Yesi Novaria Kunang
, Siti Nurmaini, Deris Stiawan, Bhakti Yudho Suprapto:
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. 102804 - Po-Wen Chi, Ming-Hung Wang
:
Deniable search of encrypted cloud-storage data. 102806 - Retraction notice to "A Hybrid Security Strategy (HS2) for Reliable Video Streaming in Fog Computing" Journal of Information Security and Applications 51 (2020) 102412. 102807
- Aditya Kumar Sahu
, Gandharba Swain, Monalisa Sahu, J. Hemalatha:
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP. 102808 - Nadeem Iqbal
, Muhammad Hanif, Sagheer Abbas
, Muhammad Adnan Khan
, Zia Ul Rehman:
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. 102809 - Fawaz Mahiuob Mohammed Mokbal, Dan Wang, Xiaoxi Wang, Wenbin Zhao, Lihua Fu:
XGBXSS: An Extreme Gradient Boosting Detection Framework for Cross-Site Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters Optimization. 102813
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.