


default search action
Journal of Information Security and Applications, Volume 91
Volume 91, 2025
- Xiao Wang
, Yong Xie
, Dingyi Shui, Shaolong Ge:
An improved biometric authentication and key agreement scheme based on fuzzy extractor for Wireless Body Area Networks. 104047 - Sonam Mittal
:
Fully homomorphic encryption-based optimal key encryption for privacy preservation in the cloud sector. 104048 - Aryan Sharma, Deepak Mishra
, Sanjay K. Jha, Aruna Seneviratne:
Wi-Spoof: Generating adversarial wireless signals to deceive Wi-Fi sensing systems. 104052 - Abdullahi Yahya Imam
, Fagen Li
:
Efficient lightweight anonymous authentication scheme with certificateless aggregation for VANETs. 104053 - Georgios Paparis
, Apostolis Zarras
, Aristeidis Farao
, Christos Xenakis
:
CRASHED: Cyber risk assessment for smart home electronic devices. 104054 - Thanh Nhan Vo, Tzu-Chuen Lu
:
Interpolation data hiding schemes based on center folding strategy and well-turned embedded positions. 104055 - Haotian Yin
, Jie Zhang
, Wanxin Li
, Yuji Dong, Eng Gee Lim
, Dominik Wojtczak
:
Updatable Signature with public tokens. 104058 - Fatemeh Rezaeibagha
, Leyou Zhang, Ke Huang
, Lanxiang Chen
:
Authenticable Distributed Homomorphic Private Counter and its application in data analysis of edge computing. 104059 - Xin Bie, Zhenhua Liu, Han Liang:
Vertin: Fast, Communication-friendly and Key-compact secure inference system for NNs and LLMs. 104060 - Zhenhua Liu, Han Liang, Jinhua Wang, Baocang Wang:
Third-party private set intersection with application to privacy-preserving training of large language models. 104061 - Longhui Shu, Shi Dong
:
Enhanced unknown Android Malware Detection using LG-PN: A local-global fusion approach in prototypical networks. 104062 - Matteo Brosolo
, Vinod P., Mauro Conti
:
Through the static: Demystifying malware visualization via explainability. 104063 - Wenyi Zhu, Xiaolong Liu, Yimeng Liu, Yizhou Shen
, Xiao-Zhi Gao, Shigen Shen
:
RT-A3C: Real-time Asynchronous Advantage Actor-Critic for optimally defending malicious attacks in edge-enabled Industrial Internet of Things. 104073 - Theodoros Symeonidis
, Aristidis Ilias, Yannis C. Stamatiou
:
A study on implementing the BLAS interface in the MPC context. 104036 - Qi Liu
, Kaibin Bao, Veit Hagenmeyer
:
Commander: A robust cross-machine multi-phase Advanced Persistent Threat detector via provenance analytics. 104057 - Dexin Zhu, Zilong Zhao, Jian Zhao, Lijun Song, Jun Zheng:
QMDS:QKD-based multi-index data secure sharing solution on blockchain. 104077

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.