Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr69.bht:"
@article{DBLP:journals/istr/Bagherpour22, author = {Bagher Bagherpour}, title = {An efficient verifiable secret redistribution scheme}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103295}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103295}, doi = {10.1016/J.JISA.2022.103295}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Bagherpour22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BharathirajaKGH22, author = {S. Bharathiraja and B. Rajesh Kanna and S. Geetha and M. Hariharan}, title = {Exposing digital image forgeries from statistical footprints}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103273}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103273}, doi = {10.1016/J.JISA.2022.103273}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BharathirajaKGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChagantiRP22, author = {Rajasekhar Chaganti and Vinayakumar Ravi and Tuan D. Pham}, title = {Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103306}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103306}, doi = {10.1016/J.JISA.2022.103306}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChagantiRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenC22, author = {Sisheng Chen and Chin{-}Chen Chang}, title = {Reversible data hiding in encrypted images using block-based adaptive MSBs prediction}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103297}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103297}, doi = {10.1016/J.JISA.2022.103297}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenYXGH22, author = {Jiyou Chen and Gaobo Yang and Ming Xia and Zhiqing Guo and Tianqiang Huang}, title = {HDNet: {A} dual-stream network with progressive fusion for image hazing detection}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103271}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103271}, doi = {10.1016/J.JISA.2022.103271}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenYXGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChouhanPB22, author = {Vikas Chouhan and Sateesh Kumar Peddoju and Rajkumar Buyya}, title = {\emph{dualDup}: {A} secure and reliable cloud storage framework to deduplicate the encrypted data and key}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103265}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103265}, doi = {10.1016/J.JISA.2022.103265}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChouhanPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeyDSS22, author = {Kunal Dey and Sumit Kumar Debnath and Pantelimon Stanica and Vikas Srivastava}, title = {A post-quantum signcryption scheme using isogeny based cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103280}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103280}, doi = {10.1016/J.JISA.2022.103280}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeyDSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuWZLBL22, author = {Zhenyu Du and Xingxing Wei and Weiming Zhang and Fangzheng Liu and Huanyu Bian and Jiayang Liu}, title = {A motional but temporally consistent physical video examples}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103278}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103278}, doi = {10.1016/J.JISA.2022.103278}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DuWZLBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HossainIA22, author = {Md. Shafaeat Hossain and Mohammad T. Islam and Zahid Akhtar}, title = {Incorporating deep learning into capacitive images for smartphone user authentication}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103290}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103290}, doi = {10.1016/J.JISA.2022.103290}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HossainIA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JanaJLV22, author = {Sharmistha Jana and Biswapati Jana and Tzu{-}Chuen Lu and Thanh Nhan Vo}, title = {Reversible data hiding scheme exploiting center folding with fuzzy weight strategy}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103276}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103276}, doi = {10.1016/J.JISA.2022.103276}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JanaJLV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLD22, author = {Donghan Li and Jinqing Li and Xiaoqiang Di}, title = {A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103304}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103304}, doi = {10.1016/J.JISA.2022.103304}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Martinez-DiazLR22, author = {Ismel Mart{\'{\i}}nez{-}D{\'{\i}}az and Carlos Miguel Leg{\'{o}}n{-}P{\'{e}}rez and Omar Rojas and Guillermo Sosa G{\'{o}}mez and Diego Oliva}, title = {Local Search Trajectories over S-box space}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103272}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103272}, doi = {10.1016/J.JISA.2022.103272}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Martinez-DiazLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MohammadiRS22, author = {Mahin Mohammadi and Reza Rawassizadeh and Abbas Sheikhtaheri}, title = {A consumer-centered security framework for sharing health data in social networks}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103303}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103303}, doi = {10.1016/J.JISA.2022.103303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MohammadiRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharmaRB22, author = {Madhu Sharma and Ranjeet Kumar Ranjan and Vishal Bharti}, title = {A pseudo-random bit generator based on chaotic maps enhanced with a bit-XOR operation}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103299}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103299}, doi = {10.1016/J.JISA.2022.103299}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SharmaRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShawD22, author = {Surbhi Shaw and Ratna Dutta}, title = {Post-quantum secure identity-based signature achieving forward secrecy}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103275}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103275}, doi = {10.1016/J.JISA.2022.103275}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShawD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SisaudiaV22, author = {Varsha Sisaudia and Virendra P. Vishwakarma}, title = {A secure gray-scale image watermarking technique in fractional {DCT} domain using zig-zag scrambling}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103296}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103296}, doi = {10.1016/J.JISA.2022.103296}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SisaudiaV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SonLMAD22, author = {Tran The Son and Chando Lee and Hoa Le Minh and Nauman Aslam and Vuong Cong Dat}, title = {An enhancement for image-based malware classification using machine learning with low dimension normalized input images}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103308}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103308}, doi = {10.1016/J.JISA.2022.103308}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SonLMAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangPNY22, author = {Xiangyang Wang and Fanchen Peng and Panpan Niu and Hongying Yang}, title = {Statistical image watermark decoder using {NSM-HMT} in {NSCT-FGPCET} magnitude domain}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103312}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103312}, doi = {10.1016/J.JISA.2022.103312}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangPNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuZXWF22, author = {Qiyu Wu and Fucai Zhou and Jian Xu and Qiang Wang and Da Feng}, title = {Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103270}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103270}, doi = {10.1016/J.JISA.2022.103270}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuZXWF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuTYWKFW22, author = {Rongze Xu and Zhanyong Tang and Guixin Ye and Huanting Wang and Xin Ke and Dingyi Fang and Zheng Wang}, title = {Detecting code vulnerabilities by learning from large-scale open source repositories}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103293}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103293}, doi = {10.1016/J.JISA.2022.103293}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XuTYWKFW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangLLS22, author = {Yi Zhang and Guoqiang Liu and Chao Li and Xuan Shen}, title = {Impossible differential cryptanalysis of {FBC-128}}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103279}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103279}, doi = {10.1016/J.JISA.2022.103279}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhuTWZ22, author = {Ding Zhu and Xiaojun Tong and Zhu Wang and Miao Zhang}, title = {A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic System}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103289}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103289}, doi = {10.1016/J.JISA.2022.103289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhuTWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.