![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 73
Volume 73, March 2023
- Jiarui Yu
, Jingsong Cui, Hang Tu, Chunwu Yu, Man Zhou:
A SM2 based efficient and lightweight batch verification approach for IC cards. 103409 - Bolun Wu
, Futai Zou, Chengwei Zhang, Tangda Yu, Yun Li:
Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network. 103411 - Gadde Swetha, J. Amutharaj, S. Usha:
A security model to protect the isolation of medical data in the cloud using hybrid cryptography. 103412 - Ching-Nung Yang
, Peng Li
, Hsin-Chuan Kuo:
(k, n) secret image sharing scheme with privileged set. 103413 - Jung-San Lee
, Ying-Chin Chen, Chit-Jie Chew, Wei-Che Hung
, Yun-Yi Fan, Bo Li:
Constructing gene features for robust 3D mesh zero-watermarking. 103414 - Amina Msolli, Nader Ajmi
, Abdelhamid Helali, Abdelaziz Gassoumi, Hassen Maaref, Ridha Mghaieth:
New key management scheme based on pool-hash for WSN and IoT. 103415 - Xiaobing Sun
, Liangqiong Tu, Jiale Zhang
, Jie Cai, Bin Li, Yu Wang
:
ASSBert: Active and semi-supervised bert for smart contract vulnerability detection. 103423 - Joel Höglund
, Martin Furuhed, Shahid Raza
:
Lightweight certificate revocation for low-power IoT with end-to-end security. 103424 - Xiaoyu Zhou
, Wien Hong
, Tung-Shou Chen, Guangsong Yang
:
Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques. 103425 - Cheng Guo, Litao Wang, Xinyu Tang, Bin Feng, Guofeng Zhang:
Two-party interactive secure deduplication with efficient data ownership management in cloud storage. 103426 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin
:
Distributed auditing protocol for untraceable transactions. 103429 - Takeshi Koshiba
, Behrouz Zolfaghari
, Khodakhast Bibak
:
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm. 103430 - Anupama Arjun Pandit
, Atul Kumar
, Arun Mishra
:
LWR-based Quantum-Safe Pseudo-Random Number Generator. 103431 - Meryem Soysaldi Sahin
, Sedat Akleylek
:
A survey of quantum secure group signature schemes: Lattice-based approach. 103432 - Lukas Daubner
, Martin Macák, Raimundas Matulevicius, Barbora Buhnova, Sofija Maksovic, Tomás Pitner:
Addressing insider attacks via forensic-ready risk management. 103433 - Krunal Randive
, R. Mohan, Ambairam Muthu Sivakrishna:
An efficient pattern-based approach for insider threat classification using the image-based feature representation. 103434 - Anmol Kumar
, Gaurav Somani
:
Service separation assisted DDoS attack mitigation in cloud targets. 103435 - Zheng Wang, Bin Liu
, Jingzhao Chen
, Weihua Huang, Yong Hu:
Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game. 103436 - Junyan Guo
, Ye Du
, Dawei Zhang
, Runfang Wu:
PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network. 103437 - Jintong Sun
, Fucai Zhou, Qiang Wang, Zi Jiao
, Yun Zhang
:
Flexible revocation and verifiability for outsourced Private Set Intersection computation. 103438 - Jun Li
, Minqing Zhang, Ke Niu, Xiaoyuan Yang:
Investigation on principles for cost assignment in motion vector-based video steganography. 103439 - Zhangdong Wang, Jiaohua Qin
, Xuyu Xiang, Yun Tan
, Jia Peng:
A privacy-preserving cross-media retrieval on encrypted data in cloud computing. 103440 - Meng Zhao, Yong Ding
, Shijie Tang, Hai Liang
, Changsong Yang
, Huiyong Wang:
Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data. 103441 - Lin Yang, Dawen Xu
, Rangding Wang, Songhan He:
Adaptive HEVC video steganography based on distortion compensation optimization. 103442 - Suhui Liu
, Liquan Chen
, Hongtao Yu, Shang Gao, Huiyu Fang
:
BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT. 103443 - Vishal A. Thakor
, Mohammad Abdur Razzaque
, Anand D. Darji
, Aksh R. Patel:
A novel 5-bit S-box design for lightweight cryptography algorithms. 103444
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.