default search action
Journal of Information Security and Applications, Volume 47
Volume 47, August 2019
- Wenjuan Li, Lam For Kwok:
Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis. 1-7 - Devender Kumar, Harmanpreet Singh Grover, Adarsh:
A secure authentication protocol for wearable devices environment using ECC. 8-15 - Saeideh Kabirirad, Ziba Eslami:
Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. 16-27 - Mohammad Moosazadeh, Gholamhossein Ekbatanifard:
A new DCT-based robust image watermarking method using teaching-learning-Based optimization. 28-38
- Jining Zhao, Chunxiang Xu, Kefei Chen:
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy. 39-49
- Yinyuan Zhao, Haoran Yuan, Tao Jiang, Xiaofeng Chen:
Secure distributed data geolocation scheme against location forgery attack. 50-58 - Dongmei Li, Xiaolei Dong, Zhenfu Cao, Haijiang Wang:
Privacy-preserving outsourced image feature extraction. 59-64
- Peng Zhang, Juntao Gao, Wenjuan Jia, Xuelian Li:
Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s). 65-77
- Lizhi Xiong, Danping Dong:
Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. 78-85
- Yanhua Zhang, Yupu Hu, Yong Gan, Yifeng Yin, Huiwen Jia:
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe. 86-93 - Rajeev Kumar, Dae-Soo Kim, Ki-Hyun Jung:
Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. 94-103 - Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao, Ying Jin, Jinsong Shan:
Heterogeneous deniable authentication and its application to e-voting systems. 104-111 - Oliver Buckley, Jason R. C. Nurse:
The language of biometrics: Analysing public perceptions. 112-119
- Zhiliang Deng, Ying Zhang, Xiaorui Zhang, Lingling Li:
Privacy-preserving quantum multi-party computation based on circular structure. 120-124 - Yepeng Liu, Yongjun Ren, Chunpeng Ge, Jinyue Xia, Qirun Wang:
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system. 125-131 - Xiaoliang Wang, Liang Bai, Qing Yang, Liu Wang, Frank Jiang:
A dual privacy-preservation scheme for cloud-based eHealth systems. 132-138 - Muhammad Ali, Stavros Shiaeles, Nathan L. Clarke, Dimitrios Kontogeorgis:
A proactive malicious software identification approach for digital forensic examiners. 139-155 - Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas:
An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks. 156-172 - Mohamed Essaid, Ismail Akharraz, Abderrahim Saaidi, Ali Mouhib:
Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. 173-187 - Ali Broumandnia:
Designing digital image encryption using 2D and 3D reversible modular chaotic maps. 188-198 - Ru Zhang, Chunjing Lu, Jianyi Liu:
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting. 199-207 - Xuehu Yan, Lintao Liu, Yuliang Lu, Qinghong Gong:
Security analysis and classification of image secret sharing. 208-216 - Min Yang, Shibin Zhang, Hang Zhang, Jinyue Xia:
A new user behavior evaluation method in online social network. 217-222 - Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Amit Maraj, Ramiro Liscano, Christopher Bellman:
Inside out - A study of users' perceptions of password memorability and recall. 223-234
- Pei Li, Shihao Zhou, Bingqing Ren, Shuman Tang, Ting Li, Chang Xu, Jiageng Chen:
Efficient implementation of lightweight block ciphers on volta and pascal architecture. 235-245 - Franco Frattolillo:
A multiparty watermarking protocol for cloud environments. 246-257
- Pengfei Liang, Leyou Zhang, Li Kang, Juan Ren:
Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage. 258-266 - Yogesh K. Meghrajani, Laxmi S. Desai, Himanshu S. Mazumdar:
Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share. 267-274
- Susmita Mahato, Dilip Kumar Yadav, Danish Ali Khan:
A novel information hiding scheme based on social networking site viewers' public comments. 275-283
- Yong Wang, Abdelrhman Hassan, Xiaoran Duan, Xiaosong Zhang:
An efficient multiple-user location-based query authentication approach for social networking. 284-294
- Yousheng Zhou, Xingwang Long, Lvjun Chen, Zheng Yan:
Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs. 295-301 - Daniel Patrick Pereira, Celso M. Hirata, Simin Nadjm-Tehrani:
A STAMP-based ontology approach to support safety and security analyses. 302-319 - Nashreen Nesa, Tania Ghosh, Indrajit Banerjee:
Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map. 320-328
- Jinqiu Hou, Mingming Jiang, Yuyan Guo, Wangan Song:
Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model. 329-334 - Yong Wang, Abdelrhman Hassan, Fei Liu, Yuanfeng Guan, Zhiwei Zhang:
Secure string pattern query for open data initiative. 335-352 - Jinwei Wang, Yangyang Li, Jian Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness. 353-362 - Michail Tsikerdekis, Taylor Morse, Cari Dean, Jason Ruffin:
A taxonomy of features for preventing identity deception in online communities and their estimated efficacy. 363-370 - Yan-Xiang Hu, Yi-Ning Liu:
A progressively essential secret image sharing scheme using hierarchy shadow. 371-376
- Sitalakshmi Venkatraman, Mamoun Alazab, R. Vinayakumar:
A hybrid deep learning image-based analysis for effective malware detection. 377-389
- Manal A. Mizher, Riza Sulaiman, Ayman M. Abdalla, Manar Abduljabbar Ahmad Mizher:
An improved simple flexible cryptosystem for 3D objects with texture maps and 2D images. 390-409 - M. M. Annie Alphonsa, N. MohanaSundaram:
A reformed grasshopper optimization with genetic principle for securing medical data. 410-420
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.