default search action
Journal of Information Security and Applications, Volume 58
Volume 58, May 2021
- Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Chien-Ming Chen, Saru Kumari:
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). 102625 - Antoine Boutet, Mathieu Cunche:
Privacy protection for Wi-Fi location positioning systems. 102635 - Zhuoqun Xia, Zhenwei Fang, Ke Gu, Jin Wang, Jingjing Tan, Guanghui Wang:
Effective charging identity authentication scheme based on fog computing in V2G networks. 102649 - Yanbin Zhang, Ke Cheng, Fazlullah Khan, Ryan Alturki, Rahim Khan, Ateeq Ur Rehman:
A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities. 102683 - Bakkiam David Deebak, Fadi M. Al-Turjman:
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems. 102689 - Michele La Manna, Pericle Perazzo, Gianluca Dini:
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks. 102692 - Yen-Lung Lai, Minyi Li, Shiuan-Ni Liang, Zhe Jin:
Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources. 102695 - Akshay Mathur, Laxmi Mounika Podila, Keyur Kulkarni, Quamar Niyaz, Ahmad Y. Javaid:
NATICUSdroid: A malware detection framework for Android using native and custom permissions. 102696 - Yanli Ren, Xiangyu Li, Shifeng Sun, Xingliang Yuan, Xinpeng Zhang:
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. 102698 - Rui Wang, Guoqiang Deng, Xue-Feng Duan:
An image encryption scheme based on double chaotic cyclic shift and Josephus problem. 102699 - Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh:
Simple and scalable blockchain with privacy. 102700 - Xiaofeng Chen, Chaoqun Hong:
An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction. 102702 - Shilpee Prasad, B. R. Purushothama:
CCA secure and efficient proxy re-encryption scheme without bilinear pairing. 102703 - Wencheng Yang, Song Wang, Muhammad Shahzad, Wei Zhou:
A cancelable biometric authentication system based on feature-adaptive random projection. 102704 - Izza Sarah, Mustapha Benssalah, Karim Drouiche:
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. 102705 - M. Vijay, G. Indumathi:
Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications. 102707 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Designated-ciphertext searchable encryption. 102709 - Jan Sher Khan, Sema Koç Kayhan:
Chaos and compressive sensing based novel image encryption scheme. 102711 - Gustavo Gonzalez Granadillo, Mario Faiella, Ibéria Medeiros, Rui Azevedo, Susana Gonzalez Zarzosa:
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities. 102715 - Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury:
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems. 102717 - Stuart Millar, Niall McLaughlin, Jesús Martínez del Rincón, Paul Miller:
Multi-view deep learning for zero-day Android malware detection. 102718 - Peng-Cheng Huang, Chinchen Chang, Yung-Hui Li, Yanjun Liu:
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism. 102719 - Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi:
A novel sophisticated hybrid method for intrusion detection using the artificial immune system. 102721 - Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Quanrun Li:
Design of ideal secret sharing based on new results on representable quadripartite matroids. 102724 - Constantinos Patsakis, Fran Casino:
Exploiting statistical and structural features for the detection of Domain Generation Algorithms. 102725 - Shaikha Hasan, Mazen Ali, Sherah Kurnia, Ramayah Thurasamy:
Evaluating the cyber security readiness of organizations and its influence on performance. 102726 - Ruhul Amin, Isha Pali, Venkatasamy Sureshkumar:
Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs. 102729 - Sumit Kumar Debnath, Tanmay Choudhury, Nibedita Kundu, Kunal Dey:
Post-quantum secure multi-party private set-intersection in star network topology. 102731 - Zhaoning You, Yan Liu, Tiegang Gao:
A lossless self-recovery watermarking scheme with JPEG-LS compression. 102733 - Roop Singh, Alaknanda Ashok:
An optimized robust watermarking technique using CKGSA in frequency domain. 102734 - Wadi' Hijawi, Ja'far Alqatawna, Ala' M. Al-Zoubi, Mohammad A. Hassonah, Hossam Faris:
Android botnet detection using machine learning models based on a comprehensive static analysis approach. 102735 - Kamalesh Acharya, Ratna Dutta:
Constructing provable secure broadcast encryption scheme with dealership. 102736 - Yu Zhou, Xinfeng Dong, Yongzhuang Wei:
On the transparency order relationships between one Boolean function and its decomposition functions. 102738 - Dawid Polap, Gautam Srivastava, Keping Yu:
Agent architecture of an intelligent medical system based on federated learning and blockchain technology. 102748 - Bakkiam David Deebak, Fadi M. Al-Turjman:
Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements. 102749 - O. S. Jannath Nisha, Somasundaram Mary Saira Bhanu:
Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment. 102751 - Christoforos Ntantogian, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis:
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation. 102752 - K. Sowjanya, Mou Dasgupta, Sangram Ray:
Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things. 102761 - Yanbin Li, Yu Liu, Yongheng Dai, Pengda Wang:
A party-adaptive variant of LowGear. 102763 - Jay Shah, Sarthak Agarwal, Arpit Shukla, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar:
Blockchain-based scheme for the mobile number portability. 102764 - Sejal Gupta, Ritu Garg, Nitin Gupta, Waleed S. Alnumay, Uttam Ghosh, Pradip Kumar Sharma:
Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks. 102768 - Muhammad Asad Saleem, SK Hafizul Islam, Shafiq Ahmed, Khalid Mahmood, Majid Hussain:
Provably secure biometric-based client-server secure communication over unreliable networks. 102769 - Asma Chaouch, Laurent-Stéphane Didier, Fangan-Yssouf Dosso, Nadia El Mrabet, Belgacem Bouallegue, Bouraoui Ouni:
Two hardware implementations for modular multiplication in the AMNS: Sequential and semi-parallel. 102770 - Mengji Chen, Taj Malook, Ateeq Ur Rehman, Yar Muhammad, Mohammad Dahman Alshehri, Aamir Akbar, Muhammad Bilal, Muazzam Ali Khan:
Blockchain-Enabled healthcare system for detection of diabetes. 102771 - André Lizardo, Raul Barbosa, Samuel Neves, Jaime Correia, Filipe Araújo:
End-to-end secure group communication for the Internet of Things. 102772 - Debasis Gountia, Sudip Roy:
Security model for protecting intellectual property of state-of-the-art microfluidic biochips. 102773 - Amal Gassara, Ismael Bouassida Rodriguez:
Describing correct UAVs cooperation architectures applied on an anti-terrorism scenario. 102775 - Nibedita Kundu, Sumit Kumar Debnath, Dheerendra Mishra:
A secure and efficient group signature scheme based on multivariate public key cryptography. 102776 - Luigi Logrippo:
Multi-level models for data security in networks and in the Internet of things. 102778 - Bechir Alaya, Lamaa Sellami:
Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks. 102779 - Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien-Ming Chen:
On the construction of a post-quantum blockchain for smart city. 102780 - Hassan N. Noura, Reem Melki, Ali Chehab:
Efficient data confidentiality scheme for 5G wireless NOMA communications. 102781 - Nimish Mishra, SK Hafizul Islam, Sherali Zeadally:
A comprehensive review on collision-resistant hash functions on lattices. 102782 - Ying Li, Jiaxing Cheng, Cheng Huang, Zhouguo Chen, Weina Niu:
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums. 102784 - Soufiane Sail, Roberto Magán-Carrión, Inmaculada Medina-Bulo, Halima Bouden:
Preserving authentication and availability security services through Multivariate Statistical Network Monitoring. 102785 - Damandeep Kaur, Devender Kumar:
Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. 102787 - Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz, SK Hafizul Islam:
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security. 102788 - Rahul Sharma, Mohammad Wazid, Prosanta Gope:
A blockchain based secure communication framework for community interaction. 102790 - Haiyu Li, Tao Wang, Zirui Qiao, Bo Yang, Yueyang Gong, Jingyi Wang, Guoyong Qiu:
Blockchain-based searchable encryption with efficient result verification and fair payment. 102791 - Lingling Lv, Zhipeng Yang, Lei Zhang, Quanzhen Huang, Zhihong Tian:
Multi-party transaction framework for drone services based on alliance blockchain in smart cities. 102792 - Shiyue Qin, Zhenhua Tan, Bin Zhang, Fucai Zhou:
Distributed secret sharing scheme based on the high-dimensional rotation paraboloid. 102797 - Firas Hazzaa, Antesar M. Shabut, Nada Hussein M. Ali, Marcian N. Cirstea:
Security Scheme Enhancement for Voice over Wireless Networks. 102798 - Gaurav Pareek, B. R. Purushothama:
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets. 102799 - Yesi Novaria Kunang, Siti Nurmaini, Deris Stiawan, Bhakti Yudho Suprapto:
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. 102804 - Po-Wen Chi, Ming-Hung Wang:
Deniable search of encrypted cloud-storage data. 102806 - Retraction notice to "A Hybrid Security Strategy (HS2) for Reliable Video Streaming in Fog Computing" Journal of Information Security and Applications 51 (2020) 102412. 102807
- Aditya Kumar Sahu, Gandharba Swain, Monalisa Sahu, J. Hemalatha:
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP. 102808 - Nadeem Iqbal, Muhammad Hanif, Sagheer Abbas, Muhammad Adnan Khan, Zia Ul Rehman:
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. 102809 - Fawaz Mahiuob Mohammed Mokbal, Dan Wang, Xiaoxi Wang, Wenbin Zhao, Lihua Fu:
XGBXSS: An Extreme Gradient Boosting Detection Framework for Cross-Site Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters Optimization. 102813
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.