![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 75
Volume 75, June 2023
- Edlira Dushku
, Md Masoom Rabbani
, Jo Vliegen, An Braeken
, Nele Mentens
:
PROVE: Provable remote attestation for public verifiability. 103448 - Roberto De Prisco, Alfredo De Santis
, Delfina Malandrino
, Rocco Zaccagnino
:
An improved privacy attack on smartphones exploiting the accelerometer. 103479 - Hui Cui
, Zhiguo Wan, Huayi Qi, Baodong Qin, Xun Yi
:
Password-authenticated proofs of retrievability for multiple devices checking cloud data. 103480 - Jinghui Zhang, Boxi Liang, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang:
Mobile applications identification using autoencoder based electromagnetic side channel analysis. 103481 - Sourav Bera
, Suryakant Prasad, Y. Sreenivasa Rao, Ashok Kumar Das
, Youngho Park:
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment. 103482 - Nai Wang, Junjun Chen, Di Wu, Wencheng Yang
, Yong Xiang, Atul Sajjanhar
:
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things. 103483 - Hengyan Zhang, Weizhe Zhang
, Yuming Feng
, Yang Liu
:
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction. 103484 - Zamineh Najafi, Shahram Babaie
:
A lightweight hierarchical key management approach for internet of things. 103485 - Farnood Faghihi
, Mohammad Zulkernine, Steven H. H. Ding:
AIM: An Android Interpretable Malware detector based on application class modeling. 103486 - Junying Liang, Haipeng Peng
, Lixiang Li
, Fenghua Tong
, Shuang Bao, Lanlan Wang:
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme. 103487 - Huifang Yu
, Wenxuan Hui
:
Certificateless ring signature from NTRU lattice for electronic voting. 103496 - Sabarathinam Chockalingam
, Wolter Pieters, André M. H. Teixeira
, Pieter H. A. J. M. van Gelder:
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures. 103497 - Jatin Arora
, Ketti Ramchandran Ramkumar, Sathiyaraj R, G. S. Pradeep Ghantasala:
Securing web documents by using piggybacked framework based on Newton's forward interpolation method. 103498 - Masahito Ishizaka, Kazuhide Fukushima:
Wildcarded identity-based ring signatures based on linearly homomorphic signatures. 103499 - Muqadar Ali, Hongjie He, Abid Hussain, Mehboob Hussain, Yuan Yuan:
Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing. 103500 - Patricio Zambrano
, Jenny Torres
, Luis Tello-Oquendo
, Ángel Yánez
, Luis Velásquez:
On the modeling of cyber-attacks associated with social engineering: A parental control prototype. 103501 - Johannes Schneider, Giovanni Apruzzese
:
Dual adversarial attacks: Fooling humans and classifiers. 103502 - Shuitao Guo
, Shijie Zhu, Changqing Zhu, Na Ren, Wei Tang, Dingjie Xu
:
A robust and lossless commutative encryption and watermarking algorithm for vector geographic data. 103503 - Ruizhong Du, Na Liu
, Mingyue Li, Junfeng Tian:
Block verifiable dynamic searchable encryption using redactable blockchain. 103504 - Purva Rewal, Mrityunjay Singh
, Dheerendra Mishra
, Komal Pursharthi
, Ankita Mishra:
Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices. 103505 - Priyabrata Dash
, Fagul Pandey, Monalisa Sarma, Debasis Samanta:
Efficient private key generation from iris data for privacy and security applications. 103506 - Zhaopin Su
, Mengke Li, Guofu Zhang
, Qinfang Wu, Yaofei Wang
:
Robust audio copy-move forgery detection on short forged slices using sliding window. 103507 - Jiaqi Chen, Chong Yuan
, Jiashuo Li, Donghai Tian
, Rui Ma, Xiaoqi Jia:
ELAMD: An ensemble learning framework for adversarial malware defense. 103508 - Ana Paula Vazão, Leonel Santos
, Rogério Luís C. Costa
, Carlos Rabadão
:
Implementing and evaluating a GDPR-compliant open-source SIEM solution. 103509 - Wen Chang, Zhen-Zhen Li
, Fu-Cheng You, Xing-Bo Pan:
Dynamic quantum fully homomorphic encryption scheme based on universal quantum circuit. 103510 - Zhaorui Ma, Shicheng Zhang, Xinhao Hu, Na Li, Qinglei Zhou, Fenlin Liu, Hongjian Wang, Guangwu Hu, Qilin Dong:
GWS-Geo: A graph neural network based model for street-level IPv6 geolocation. 103511 - Yihao Wang
, Ru Zhang, Jianyi Liu:
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length. 103512 - Xin Hou
, Xiaofeng Jia
, Jun Shao
:
Public key encryption with public-verifiable decryption delegation and its application. 103513 - Xiaofeng Shen, Heng Yao
, Shunquan Tan
, Chuan Qin:
VHNet: A Video Hiding Network with robustness to video coding. 103515 - Pengcheng Luo, Jian Chu, Genke Yang:
IP packet-level encrypted traffic classification using machine learning with a light weight feature engineering method. 103519 - Xiaotian Wu
, Ching-Nung Yang
, Hong-Wu Cai, Yanxiao Liu:
A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding. 103520 - Ming Xia, Jiyou Chen, Gaobo Yang, Shuai Wang:
Robust detection of seam carving with low ratio via pixel adjacency subtraction and CNN-based transfer learning. 103522
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.