


default search action
Journal of Information Security and Applications, Volume 85
Volume 85, 2024
- JingYu Feng, Jing Zhang, Wenbo Zhang
, Gang Han:
Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet. 103831 - Avinash Kumar Chaurasia, Matin Fallahi
, Thorsten Strufe, Philipp Terhörst
, Patricia Arias Cabarcos
:
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research. 103832 - ChuanPeng Guo
, Wei Yang
, Liusheng Huang:
Semi-supervised QIM steganalysis with ladder networks. 103834 - Dewang Wang, Gaobo Yang, Zhiqing Guo
, Jiyou Chen:
Improving image steganography security via ensemble steganalysis and adversarial perturbation minimization. 103835 - Kanneboina Ashok
, S. Gopikrishnan
:
A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment. 103836 - Lívia Maria Bettini de Miranda
, Rodrigo Dutra Garcia
, Gowri Sankar Ramachandran
, Jo Ueyama
, Fábio Müller Guerrini:
Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making. 103837 - Tarek Gaber
, Mathew Nicho
, Esraa Ahmed, Ahmed Hamed
:
Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer. 103838 - Omair Faraj
, David Megías
, Joaquín García
:
ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks. 103840 - Qianrong Zheng, Jianwen Xiang, Rui Hao, Xuemin Zhang, Songsong Liao
, Dongdong Zhao:
A cancellable iris template protection scheme based on inverse merger and Bloom filter. 103849 - Ahmed Raza
, Mehdi Hussain
, Hasan Tahir
, Muhammad Zeeshan
, Muhammad Adil Raja
, Ki-Hyun Jung
:
Forensic analysis of web browsers lifecycle: A case study. 103839 - Allard Dijk
, Emre Halisdemir
, Cosimo Melella
, Alari Schu, Mauno Pihelgas, Roland Meier:
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise. 103847 - Miaomiao Tian, Jiale Liu, Zhili Chen
, Shaowei Wang:
Privacy-preserving logistic regression with improved efficiency. 103848 - Sebastian Raubitzek, Sebastian Schrittwieser
, Elisabeth Wimmer, Kevin Mallinger:
Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns. 103850 - Jigna J. Hathaliya, Sudeep Tanwar
:
Role and attribute-based access control scheme for decentralized medicine supply chain. 103851 - Yinjuan Deng
, Shangping Wang
, Qian Zhang
:
Classified data authentication scheme for IoT based on aggregate signature and Hyperledger Fabric. 103852 - Ruonan Lin
, Yikun Huang
, Yuanyuan Zhang
, Renwan Bi
, Jinbo Xiong
:
Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing. 103854 - Pavani Meesala
, Moumita Roy
, Dalton Meitei Thounaojam
:
A robust medical image zero-watermarking algorithm using Collatz and Fresnelet Transforms. 103855 - Marco Arazzi
, Serena Nicolazzo
, Antonino Nocera
:
A deep reinforcement learning approach for security-aware service acquisition in IoT. 103856 - Qianjin Wei, Gang Rao, Xuanjing Wu:
Contract-based hierarchical security aggregation scheme for enhancing privacy in federated learning. 103857 - Honglian Shen, Xiuling Shan
, Zihong Tian:
Color image encryption scheme combining a 2D hyperchaotic Sin-Henon system and the division algorithm. 103858 - Richa Sarma, Sanjay Moulik
:
e-SAFE: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced IoT for E-Health. 103859 - Esra Günsay
, Cansu Betin Onur
, Murat Cenk
:
A different base approach for better efficiency on range proofs. 103860 - Mounika Pratapa
, Aleksander Essex
:
Secure similar patients query with homomorphically evaluated thresholds. 103861 - Tongtong Sui, Jizhi Wang, Wen Liu, Lizhen Wang, Lingrui Kong, Yue Zhao:
Comprehensively enhancing the security of control with combined homomorphic encryption. 103862 - Jun-Liu Zhong, Yan-Fen Gan, Ji-Xiang Yang:
Efficient detection of intra/inter-frame video copy-move forgery: A hierarchical coarse-to-fine method. 103863 - Alaaldin Dwaik
, Yassine Belkhouche:
Enhancing the performance of convolutional neural network image-based steganalysis in spatial domain using Spatial Rich Model and 2D Gabor filters. 103864 - Qiwei Hu, Chenyu Huang
, Guoqiang Zhang, Lingyi Cai, Tao Jiang
:
Towards accountable and privacy-preserving blockchain-based access control for data sharing. 103866 - Xuanming Chang, Beijing Chen
, Weiping Ding, Xin Liao:
A DNN robust video watermarking method in dual-tree complex wavelet transform domain. 103868 - Shengyang Luo
, Yaqi Liu, Xuehu Yan, Yuyuan Sun:
Robust secret color image sharing anti-cropping and tampering in shares. 103869 - Zhichao Yang, Debiao He
, Rongmao Chen
, Shixiong Wang, Jianqiao Xu:
Post-quantum identity-based traitor tracing. 103870 - Alan Paul
, Vishal Sharma
, Oluwafemi Olukoya
:
SQL injection attack: Detection, prioritization & prevention. 103871

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.