Search dblp for Publications

export results for "toc:db/journals/istr/istr69.bht:"

 download as .bib file

@article{DBLP:journals/istr/Bagherpour22,
  author       = {Bagher Bagherpour},
  title        = {An efficient verifiable secret redistribution scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103295},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103295},
  doi          = {10.1016/J.JISA.2022.103295},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Bagherpour22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BharathirajaKGH22,
  author       = {S. Bharathiraja and
                  B. Rajesh Kanna and
                  S. Geetha and
                  M. Hariharan},
  title        = {Exposing digital image forgeries from statistical footprints},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103273},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103273},
  doi          = {10.1016/J.JISA.2022.103273},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BharathirajaKGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChagantiRP22,
  author       = {Rajasekhar Chaganti and
                  Vinayakumar Ravi and
                  Tuan D. Pham},
  title        = {Image-based malware representation approach with EfficientNet convolutional
                  neural networks for effective malware classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103306},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103306},
  doi          = {10.1016/J.JISA.2022.103306},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChagantiRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenC22,
  author       = {Sisheng Chen and
                  Chin{-}Chen Chang},
  title        = {Reversible data hiding in encrypted images using block-based adaptive
                  MSBs prediction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103297},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103297},
  doi          = {10.1016/J.JISA.2022.103297},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenYXGH22,
  author       = {Jiyou Chen and
                  Gaobo Yang and
                  Ming Xia and
                  Zhiqing Guo and
                  Tianqiang Huang},
  title        = {HDNet: {A} dual-stream network with progressive fusion for image hazing
                  detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103271},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103271},
  doi          = {10.1016/J.JISA.2022.103271},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenYXGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChouhanPB22,
  author       = {Vikas Chouhan and
                  Sateesh Kumar Peddoju and
                  Rajkumar Buyya},
  title        = {\emph{dualDup}: {A} secure and reliable cloud storage framework to
                  deduplicate the encrypted data and key},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103265},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103265},
  doi          = {10.1016/J.JISA.2022.103265},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChouhanPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeyDSS22,
  author       = {Kunal Dey and
                  Sumit Kumar Debnath and
                  Pantelimon Stanica and
                  Vikas Srivastava},
  title        = {A post-quantum signcryption scheme using isogeny based cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103280},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103280},
  doi          = {10.1016/J.JISA.2022.103280},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeyDSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuWZLBL22,
  author       = {Zhenyu Du and
                  Xingxing Wei and
                  Weiming Zhang and
                  Fangzheng Liu and
                  Huanyu Bian and
                  Jiayang Liu},
  title        = {A motional but temporally consistent physical video examples},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103278},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103278},
  doi          = {10.1016/J.JISA.2022.103278},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DuWZLBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HossainIA22,
  author       = {Md. Shafaeat Hossain and
                  Mohammad T. Islam and
                  Zahid Akhtar},
  title        = {Incorporating deep learning into capacitive images for smartphone
                  user authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103290},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103290},
  doi          = {10.1016/J.JISA.2022.103290},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HossainIA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JanaJLV22,
  author       = {Sharmistha Jana and
                  Biswapati Jana and
                  Tzu{-}Chuen Lu and
                  Thanh Nhan Vo},
  title        = {Reversible data hiding scheme exploiting center folding with fuzzy
                  weight strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103276},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103276},
  doi          = {10.1016/J.JISA.2022.103276},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JanaJLV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLD22,
  author       = {Donghan Li and
                  Jinqing Li and
                  Xiaoqiang Di},
  title        = {A novel exponential one-dimensional chaotic map enhancer and its application
                  in an image encryption scheme using modified ZigZag transform},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103304},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103304},
  doi          = {10.1016/J.JISA.2022.103304},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Martinez-DiazLR22,
  author       = {Ismel Mart{\'{\i}}nez{-}D{\'{\i}}az and
                  Carlos Miguel Leg{\'{o}}n{-}P{\'{e}}rez and
                  Omar Rojas and
                  Guillermo Sosa G{\'{o}}mez and
                  Diego Oliva},
  title        = {Local Search Trajectories over S-box space},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103272},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103272},
  doi          = {10.1016/J.JISA.2022.103272},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Martinez-DiazLR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MohammadiRS22,
  author       = {Mahin Mohammadi and
                  Reza Rawassizadeh and
                  Abbas Sheikhtaheri},
  title        = {A consumer-centered security framework for sharing health data in
                  social networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103303},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103303},
  doi          = {10.1016/J.JISA.2022.103303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MohammadiRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharmaRB22,
  author       = {Madhu Sharma and
                  Ranjeet Kumar Ranjan and
                  Vishal Bharti},
  title        = {A pseudo-random bit generator based on chaotic maps enhanced with
                  a bit-XOR operation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103299},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103299},
  doi          = {10.1016/J.JISA.2022.103299},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SharmaRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShawD22,
  author       = {Surbhi Shaw and
                  Ratna Dutta},
  title        = {Post-quantum secure identity-based signature achieving forward secrecy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103275},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103275},
  doi          = {10.1016/J.JISA.2022.103275},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShawD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SisaudiaV22,
  author       = {Varsha Sisaudia and
                  Virendra P. Vishwakarma},
  title        = {A secure gray-scale image watermarking technique in fractional {DCT}
                  domain using zig-zag scrambling},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103296},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103296},
  doi          = {10.1016/J.JISA.2022.103296},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SisaudiaV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SonLMAD22,
  author       = {Tran The Son and
                  Chando Lee and
                  Hoa Le Minh and
                  Nauman Aslam and
                  Vuong Cong Dat},
  title        = {An enhancement for image-based malware classification using machine
                  learning with low dimension normalized input images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103308},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103308},
  doi          = {10.1016/J.JISA.2022.103308},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SonLMAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangPNY22,
  author       = {Xiangyang Wang and
                  Fanchen Peng and
                  Panpan Niu and
                  Hongying Yang},
  title        = {Statistical image watermark decoder using {NSM-HMT} in {NSCT-FGPCET}
                  magnitude domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103312},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103312},
  doi          = {10.1016/J.JISA.2022.103312},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangPNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuZXWF22,
  author       = {Qiyu Wu and
                  Fucai Zhou and
                  Jian Xu and
                  Qiang Wang and
                  Da Feng},
  title        = {Secure and efficient multifunctional data aggregation without trusted
                  authority in edge-enhanced IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103270},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103270},
  doi          = {10.1016/J.JISA.2022.103270},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuZXWF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuTYWKFW22,
  author       = {Rongze Xu and
                  Zhanyong Tang and
                  Guixin Ye and
                  Huanting Wang and
                  Xin Ke and
                  Dingyi Fang and
                  Zheng Wang},
  title        = {Detecting code vulnerabilities by learning from large-scale open source
                  repositories},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103293},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103293},
  doi          = {10.1016/J.JISA.2022.103293},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XuTYWKFW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangLLS22,
  author       = {Yi Zhang and
                  Guoqiang Liu and
                  Chao Li and
                  Xuan Shen},
  title        = {Impossible differential cryptanalysis of {FBC-128}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103279},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103279},
  doi          = {10.1016/J.JISA.2022.103279},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhuTWZ22,
  author       = {Ding Zhu and
                  Xiaojun Tong and
                  Zhu Wang and
                  Miao Zhang},
  title        = {A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic
                  System},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103289},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103289},
  doi          = {10.1016/J.JISA.2022.103289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhuTWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics