Search dblp for Publications

export results for "toc:db/journals/cybersecapplications/cybersecapplications1.bht:"

 download as .bib file

@article{DBLP:journals/cybersecapplications/BaggaDR23,
  author       = {Palak Bagga and
                  Ashok Kumar Das and
                  Joel J. P. C. Rodrigues},
  title        = {Bilinear pairing-based access control and key agreement scheme for
                  smart transportation},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100001},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100001},
  doi          = {10.1016/J.CSA.2022.100001},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/BaggaDR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/GolightlyMGC23,
  author       = {Lewis Golightly and
                  Paolo Modesti and
                  R{\'{e}}mi Garcia and
                  Victor Chang},
  title        = {Securing distributed systems: {A} survey on access control techniques
                  for cloud, blockchain, IoT and {SDN}},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100015},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100015},
  doi          = {10.1016/J.CSA.2023.100015},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/GolightlyMGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/JavaidHSS23,
  author       = {Mohd Javaid and
                  Abid Haleem and
                  Ravi Pratap Singh and
                  Rajiv Suman},
  title        = {Towards insighting cybersecurity for healthcare domains: {A} comprehensive
                  review of recent practices and trends},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100016},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100016},
  doi          = {10.1016/J.CSA.2023.100016},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/JavaidHSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/KumarAB23,
  author       = {C. Madan Kumar and
                  Ruhul Amin and
                  M. Brindha},
  title        = {Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication
                  Protocol for Telecare Medical Information System},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100013},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100013},
  doi          = {10.1016/J.CSA.2023.100013},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/KumarAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/LaiSWL23,
  author       = {Jinshan Lai and
                  Xiaotong Song and
                  Ruijin Wang and
                  Xiong Li},
  title        = {Edge intelligent collaborative privacy protection solution for smart
                  medical},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100010},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100010},
  doi          = {10.1016/J.CSA.2022.100010},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/LaiSWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/LiT23,
  author       = {Yi Li and
                  Meiqin Tang},
  title        = {Blockchain-powered distributed data auditing scheme for cloud-edge
                  healthcare system},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100017},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100017},
  doi          = {10.1016/J.CSA.2023.100017},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/LiT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/LiuLJ23,
  author       = {Dengzhi Liu and
                  Zhimin Li and
                  Dongbao Jia},
  title        = {Secure distributed data integrity auditing with high efficiency in
                  5G-enabled software-defined edge computing},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100004},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100004},
  doi          = {10.1016/J.CSA.2022.100004},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/LiuLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/MbungeMBM23,
  author       = {Elliot Mbunge and
                  Benhildah Muchemwa and
                  John Batani and
                  Nobuhle Mbuyisa},
  title        = {A review of deep learning models to detect malware in Android applications},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100014},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100014},
  doi          = {10.1016/J.CSA.2023.100014},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/MbungeMBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/RajkumarDVR23,
  author       = {S. C. Rajkumar and
                  L. Jegatha Deborah and
                  Pandi Vijayakumar and
                  Karthick K R},
  title        = {Secure session key pairing and a lightweight key authentication scheme
                  for liable drone services},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100012},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100012},
  doi          = {10.1016/J.CSA.2022.100012},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/RajkumarDVR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SaiRPN23,
  author       = {Bodicherla Digvijay Sri Sai and
                  Nikhil Ramisetty and
                  Shivangini Prasad and
                  Nenavath Srinivas Naik},
  title        = {A decentralised {KYC} based approach for microfinance using blockchain
                  technology},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100009},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100009},
  doi          = {10.1016/J.CSA.2022.100009},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SaiRPN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SattarERDSPKU23,
  author       = {Md Rahat Ibne Sattar and
                  Md. Thowhid Bin Hossain Efty and
                  Taiyaba Shadaka Rafa and
                  Tusar Das and
                  Md Sharif Samad and
                  Abhijit Pathak and
                  Mayeen Uddin Khandaker and
                  Md Habib Ullah},
  title        = {An advanced and secure framework for conducting online examination
                  using blockchain method},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100005},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100005},
  doi          = {10.1016/J.CSA.2022.100005},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SattarERDSPKU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SenapatiR23,
  author       = {Biswa Ranjan Senapati and
                  Bharat S. Rawal},
  title        = {Quantum communication with {RLP} quantum resistant cryptography in
                  industrial manufacturing},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100019},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100019},
  doi          = {10.1016/J.CSA.2023.100019},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SenapatiR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SheikM23,
  author       = {Syed Amma Sheik and
                  Amutha Prabakar Muniyandi},
  title        = {Secure authentication schemes in cloud computing with glimpse of artificial
                  neural networks: {A} review},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100002},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100002},
  doi          = {10.1016/J.CSA.2022.100002},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SheikM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SinghKM23,
  author       = {Anjali Singh and
                  Marimuthu Karuppiah and
                  Rajendra Prasad Mahapatra},
  title        = {Cryptanalysis on "a secure three-factor user authentication and key
                  agreement protocol for {TMIS} with user anonymity "},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100008},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100008},
  doi          = {10.1016/J.CSA.2022.100008},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SinghKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/Tan23,
  author       = {Haowen Tan},
  title        = {An efficient IoT group association and data sharing mechanism in edge
                  computing paradigm},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100003},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100003},
  doi          = {10.1016/J.CSA.2022.100003},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/Tan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ThapliyalSWSD23,
  author       = {Siddhant Thapliyal and
                  Shubham Singh and
                  Mohammad Wazid and
                  Devesh Pratap Singh and
                  Ashok Kumar Das},
  title        = {Design of blockchain-enabled secure smart health monitoring system
                  and its testbed implementation},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100020},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100020},
  doi          = {10.1016/J.CSA.2023.100020},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ThapliyalSWSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/VijayalakshmiBGT23,
  author       = {S. Vijayalakshmi and
                  S. Bose and
                  Logeswari Govindaraj and
                  Anitha Thangasamy},
  title        = {Hybrid defense mechanism against malicious packet dropping attack
                  for {MANET} using game theory},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100011},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100011},
  doi          = {10.1016/J.CSA.2022.100011},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/VijayalakshmiBGT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/XuLPF23,
  author       = {Zhiyan Xu and
                  Min Luo and
                  Cong Peng and
                  Qi Feng},
  title        = {Sanitizable signature scheme with privacy protection for electronic
                  medical data sharing},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100018},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2023.100018},
  doi          = {10.1016/J.CSA.2023.100018},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/XuLPF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/YanJ23,
  author       = {Weiwei Yan and
                  Sai Ji},
  title        = {A secure and efficient {DSSE} scheme with constant storage costs in
                  smart devices},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100006},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100006},
  doi          = {10.1016/J.CSA.2022.100006},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/YanJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ZhouLWL23,
  author       = {Yousheng Zhou and
                  Xia Li and
                  Ming Wang and
                  Yuanni Liu},
  title        = {{PPT-LBS:} Privacy-preserving top-k query scheme for outsourced data
                  of location-based services},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100007},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100007},
  doi          = {10.1016/J.CSA.2022.100007},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ZhouLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics