default search action
Journal of Information Security and Applications, Volume 76
Volume 76, August 2023
- Saher Tegane, Fouzi Semchedine, Abdelmalek Boudries:
An extended Attribute-based access control with controlled delegation in IoT. 103473 - Hassan N. Noura, Ola Salman, Ali Chehab:
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms. 103514 - Mahdi Soltani, Behzad Ousat, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
An adaptable deep learning-based intrusion detection system to zero-day attacks. 103516 - Johannes Schneider, Frank Breitinger:
Towards AI forensics: Did the artificial intelligence system do it? 103517 - Yanrong Liang, Yanping Li, Kai Zhang, Zhenqiang Wu:
VMSE: Verifiable multi-keyword searchable encryption in multi-user setting supporting keywords updating. 103518 - Han Xu, Priyadarsi Nanda, Jie Liang, Xiangjian He:
FCH, an incentive framework for data-owner dominated federated learning. 103521 - Mahdi Nikooghadam, Hamid Reza Shahriari, Saeid Tousi Saeidi:
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment. 103523 - Bo Zhang, Helei Cui, Xiaoning Liu, Yaxing Chen, Zhiwen Yu, Bin Guo:
Decentralized and secure deduplication with dynamic ownership in MLaaS. 103524 - Mariia Bakhtina, Raimundas Matulevicius, Mari Seeba:
Tool-supported method for privacy analysis of a business process model. 103525 - Chenlu Xie, Runhua Shi, XiaoXu Zhang, Pengbo Wang, Wanpeng Guo:
Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments. 103526 - Tengfei Tu, Hua Zhang, Yangye Hu, Dong Cui, Xilin Zhai:
A detector for Android repackaged applications with layout-fingerprint. 103527 - Jianxiang Qi, Ning Zheng, Ming Xu, Xiaodong Wang, Yunzhi Chen:
A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks. 103528 - Siyu Yao, Yizhi Ren, Dong Wang, Yeru Wang, Weifeng Yin, Lifeng Yuan:
SNN-PPRL: A secure record matching scheme based on siamese neural network. 103529 - Terry Shue Chien Lau, Fedor Ivanov, Muhammad Rezal Kamel Ariffin, Ji-Jian Chin, Timothy Tzen Vun Yap:
New code-based cryptosystems via the IKKR framework. 103530 - Weijian Teng, Je Sen Teh, Norziana Jamil:
On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM. 103531 - Mengnan Gao, Lifa Wu, Qi Li, Wei Chen:
Anomaly traffic detection in IoT security using graph neural networks. 103532 - Khalil Hariss, Hassan N. Noura:
Homomorphic additive lightweight block cipher scheme for securing IoT applications. 103540 - J. Hemalatha, Sekar Mohan, Chandan Kumar, Adnan Gutub, Aditya Kumar Sahu:
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier. 103541 - Qiuyu Zhang, Minrui Fu, Zhenyu Zhao, Yibo Huang:
Searchable encryption over encrypted speech retrieval scheme in cloud storage. 103542 - Shen Hou, Yanzhou Ma, Ding Deng, Zhenyu Wang, Guolei Ren:
Modeling and physical attack resistant authentication protocol with double PUFs. 103543 - Cheonshik Kim, Ching-Nung Yang, Zhili Zhou, Ki-Hyun Jung:
Dual efficient reversible data hiding using Hamming code and OPAP. 103544 - Arun Kumar Rai, Hari Om, Satish Chand, Saurabh Agarwal:
Reversible data hiding in encrypted image using two-pass pixel value ordering. 103545 - Chao Chen, Fangguo Zhang, Changan Zhao:
Isogeny computation on Kummer lines and applications. 103546 - Zongwei Tang, Xiuli Chai, Yang Lu, Binjie Wang, Yong Tan:
An end-to-end screen shooting resilient blind watermarking scheme for medical images. 103547 - Li Li, Yu Bai, Ching-Chun Chang, Yunyuan Fan, Wei Gu, Mahmoud Emam:
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders. 103548 - Surbhi Shaw, Ratna Dutta:
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things. 103549 - Mengjuan Liu, Jiang Liu, Chenyang Liu, Kuo-Hui Yeh:
A task-oriented neural dialogue system capable of knowledge accessing. 103551 - Tamara Finogina, Javier Herranz:
On remote electronic voting with both coercion resistance and cast-as-intended verifiability. 103554
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.