Search dblp for Publications

export results for "toc:db/journals/ijics/ijics22.bht:"

 download as .bib file

@article{DBLP:journals/ijics/AbebeSK23,
  author       = {Abiy Tadesse Abebe and
                  Yalemzewd Negash Shiferaw and
                  P. G. V. Suresh Kumar},
  title        = {Lightweight integrated cryptosystem based on reconfigurable hardware
                  for IoT security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {323--353},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135895},
  doi          = {10.1504/IJICS.2023.135895},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AbebeSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AbhilashA23,
  author       = {M. H. Abhilash and
                  B. B. Amberker},
  title        = {Dynamic group signature scheme using ideal lattices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {60--90},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133366},
  doi          = {10.1504/IJICS.2023.133366},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AbhilashA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AgarwalK23,
  author       = {Ruchi Agarwal and
                  Manoj Kumar},
  title        = {A privacy preserving scheme for encrypted medical images using {RDH}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {436--452},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135919},
  doi          = {10.1504/IJICS.2023.135919},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AgarwalK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlmehdharAR23,
  author       = {Mohammed Almehdhar and
                  Mohammed M. Abdelsamea and
                  Na Ruan},
  title        = {Deep multi-locality convolutional neural network for DDoS detection
                  in smart home IoT},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {453--474},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135902},
  doi          = {10.1504/IJICS.2023.135902},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AlmehdharAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AzharYC23,
  author       = {Muhammad Kashif Azhar and
                  Bin Yao and
                  Zhongpu Chen},
  title        = {Enriching blockchain with spatial keyword query processing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {91--116},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133369},
  doi          = {10.1504/IJICS.2023.133369},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AzharYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChanderG23,
  author       = {Bhanu Chander and
                  Kumaravelan Gopalakrishnan},
  title        = {Outlier detection in {WSN} with {SVDD} via multi-interpolation auto-encoder},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {28--59},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133368},
  doi          = {10.1504/IJICS.2023.133368},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChanderG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChenL23,
  author       = {Lijiao Chen and
                  Kewei Lv},
  title        = {Ciphertext-policy attribute-based delay encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {167--185},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134960},
  doi          = {10.1504/IJICS.2023.134960},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ChenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DemighaH23,
  author       = {Oualid Demigha and
                  Nabil Haddad},
  title        = {Formal verification of software-only mechanisms for live migration
                  of {SGX} enclaves},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {230--261},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134965},
  doi          = {10.1504/IJICS.2023.134965},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/DemighaH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DingXCFLH23,
  author       = {Zhenquan Ding and
                  Hui Xu and
                  Lei Cui and
                  Haiqiang Fei and
                  Yongji Liu and
                  Zhiyu Hao},
  title        = {{HEMC:} a dynamic behaviour analysis system for malware based on hardware
                  virtualisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {390--410},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135899},
  doi          = {10.1504/IJICS.2023.135899},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/DingXCFLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JayashreeK23,
  author       = {S. Jayashree and
                  S. V. N. Santhosh Kumar},
  title        = {A comprehensive survey on effective key management schemes for secured
                  authentication in vehicular ad hoc network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {354--376},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135897},
  doi          = {10.1504/IJICS.2023.135897},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/JayashreeK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JoseNP23,
  author       = {Ancy Sherin Jose and
                  Latha R. Nair and
                  Varghese Paul},
  title        = {Tree derived feature importance and Bayesian optimisation for improved
                  multi-class classification of DDoS attacks in software defined networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {139--166},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134962},
  doi          = {10.1504/IJICS.2023.134962},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/JoseNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarK23,
  author       = {Dilip Kumar and
                  Manoj Kumar},
  title        = {Outsourcing decryption of {KP-ABE} using elliptic curve cryptography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {210--229},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134961},
  doi          = {10.1504/IJICS.2023.134961},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarV23,
  author       = {Umesh Kumar and
                  Vadlamudi Ch. Venkaiah},
  title        = {A novel stream cipher based on quasigroups and {QG-PRNG}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {411--435},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135900},
  doi          = {10.1504/IJICS.2023.135900},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumariM23,
  author       = {Shipra Kumari and
                  Hrishikesh Mahato},
  title        = {Construction of weighted orthogonal matrices over finite field and
                  its application in cryptography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {263--276},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135894},
  doi          = {10.1504/IJICS.2023.135894},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/KumariM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PawarGJ23,
  author       = {Ankush Balaram Pawar and
                  Shashikant U. Ghumbre and
                  Rashmi M. Jogdand},
  title        = {Performance analysis of privacy preservation-based authentication
                  scheme and cryptographic-based data protocols for DSaC in cloud},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {298--322},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135896},
  doi          = {10.1504/IJICS.2023.135896},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/PawarGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RavvaS23,
  author       = {Santosh Kumar Ravva and
                  Sureddi R. M. Krishna},
  title        = {Cryptanalysis of common prime {RSA} with two decryption exponents:
                  Jochemsz and May approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {377--389},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135901},
  doi          = {10.1504/IJICS.2023.135901},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/RavvaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SelimiRV23,
  author       = {Synim Selimi and
                  Blerim Rexha and
                  Kamer Vishi},
  title        = {CyberNFTs: conceptualising a decentralised and reward-driven intrusion
                  detection system with {ML}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {117--138},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133385},
  doi          = {10.1504/IJICS.2023.133385},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SelimiRV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/UthirapathyS23,
  author       = {Samson Ebenezar Uthirapathy and
                  Domnic Sandanam},
  title        = {Sentiment analysis in social network data using multilayer perceptron
                  neural network with hill-climbing meta-heuristic optimisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {277--297},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135892},
  doi          = {10.1504/IJICS.2023.135892},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/UthirapathyS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WuZG23,
  author       = {Zhijun Wu and
                  Chenlei Zhang and
                  Junjun Guo},
  title        = {A method of speech information hiding in inactive frame based on pitch
                  modulation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {1--27},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133367},
  doi          = {10.1504/IJICS.2023.133367},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WuZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangBWW23,
  author       = {Lizhe Zhang and
                  Zhuoning Bai and
                  Zhijun Wu and
                  Kenian Wang},
  title        = {Unified identity authentication scheme of system wide information
                  management based on {SAML-PKI-LDAP}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {186--209},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134959},
  doi          = {10.1504/IJICS.2023.134959},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangBWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics