![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 59
Volume 59, June 2021
- Moitrayee Chatterjee
, Akbar Siami Namin:
A fuzzy Dempster-Shafer classifier for detecting Web spams. 102793 - Vasileios Syrris, Dimitris Geneiatakis:
On machine learning effectiveness for malware detection in Android OS using static analysis data. 102794 - Luca Calderoni, Paolo Palmieri, Constantinos Patsakis:
Introduction to the special issue on privacy and security for location-based services and devices. 102800 - Merzougui Salah Eddine, Mohamed Amine Ferrag
, Othmane Friha
, Leandros A. Maglaras
:
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles. 102802 - Faraz Ahmad Khan, Ahmed Bouridane, Said Boussakta, Richard Jiang
, Somaya Almaadeed:
Secure facial recognition in the encrypted domain using a local ternary pattern approach. 102810 - Rajesh Gupta
, Sudeep Tanwar
, Neeraj Kumar
:
Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under imperfect CSI. 102812 - Carmen Bisogni
, Gerardo Iovane, Riccardo Emanuele Landi
, Michele Nappi:
ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions. 102814 - Somnath Panja
, Bimal Roy:
A secure end-to-end verifiable e-voting system using blockchain and cloud server. 102815 - Tian-Fu Lee, Wei-Yu Chen:
Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things. 102817 - Arpita Patidar
, Gaurav Somani
:
Serving while attacked: DDoS attack effect minimization using page separation and container allocation strategy. 102818 - Xiaochao Wang, Ding Ma, Kun Hu, Jianping Hu, Ling Du:
Mapping based Residual Convolution Neural Network for Non-embedding and Blind Image Watermarking. 102820 - Peng Chen, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li
, Arcangelo Castiglione
:
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement. 102821 - Bingfeng Xu
, Gaofeng He, Haiting Zhu
:
ME-Box: A reliable method to detect malicious encrypted traffic. 102823 - Ahmad Akmal Aminuddin Mohd Kamal
, Keiichi Iwamura:
Searchable encryption using secret sharing scheme that realizes direct search of encrypted documents and disjunctive search of multiple keywords. 102824 - Ahad Niknia
, Miguel Correia, Jaber Karimpour
:
Secure cloud-of-clouds storage with space-efficient secret sharing. 102826 - Adel Abusitta, Miles Q. Li, Benjamin C. M. Fung
:
Malware classification and composition analysis: A survey of recent developments. 102828 - Yasir Naseer, Tariq Shah, Dawood Shah:
A novel hybrid permutation substitution base colored image encryption scheme for multimedia data. 102829 - Tolun Tosun
, Erkay Savas:
FSDS: A practical and fully secure document similarity search over encrypted data with lightweight client. 102830 - Saira Jahangir, Tariq Shah:
A novel multiple color image encryption scheme based on algebra M(2, F2[u]/〈u8〉) and chaotic map. 102831 - T. Janani
, M. Brindha:
A secure medical image transmission scheme aided by quantum representation. 102832 - Mauro Alberto Brignoli, Alessio P. Caforio, Francesco Caturano, Maurizio D'Arienzo, Marco Latini, Walter Matta, Simon Pietro Romano
, B. Ruggiero:
A distributed security tomography framework to assess the exposure of ICT infrastructures to network threats. 102833 - Himanshu Agarwal
, Farooq Husain:
Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF. 102846 - Luca Ferretti
, Francesco Longo
, Giovanni Merlino
, Michele Colajanni
, Antonio Puliafito
, Nachiket Tapas
:
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things. 102848 - Chun-I Fan
, Arijit Karati
, Pei-Shan Yang:
Reliable file transfer protocol with producer anonymity for Named Data Networking. 102851 - Ömer Kasim:
An ensemble classification-based approach to detect attack level of SQL injections. 102852 - Siliang Hua
, Huiguo Zhang, Jingya Zhang, Shuchang Wang:
Optimization and implementation of the number theoretic transform butterfly unit for large integer multiplication. 102857 - Ryoma Ito
, Rentaro Shiba
, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Bit-wise cryptanalysis on AND-RX permutation Friet-PC. 102860 - Yanzhen Ren, Sen Cai
, Lina Wang:
Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD). 102863 - Kashif Naseer Qureshi
, Adi Alhudhaif
, Adeel Abass Shah, Saqib Majeed, Gwanggil Jeon:
Trust and priority-based drone assisted routing and mobility and service-oriented solution for the internet of vehicles networks. 102864
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.