Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cybersecapplications/cybersecapplications1.bht:"
@article{DBLP:journals/cybersecapplications/BaggaDR23, author = {Palak Bagga and Ashok Kumar Das and Joel J. P. C. Rodrigues}, title = {Bilinear pairing-based access control and key agreement scheme for smart transportation}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100001}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100001}, doi = {10.1016/J.CSA.2022.100001}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/BaggaDR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/GolightlyMGC23, author = {Lewis Golightly and Paolo Modesti and R{\'{e}}mi Garcia and Victor Chang}, title = {Securing distributed systems: {A} survey on access control techniques for cloud, blockchain, IoT and {SDN}}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100015}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100015}, doi = {10.1016/J.CSA.2023.100015}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/GolightlyMGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/JavaidHSS23, author = {Mohd Javaid and Abid Haleem and Ravi Pratap Singh and Rajiv Suman}, title = {Towards insighting cybersecurity for healthcare domains: {A} comprehensive review of recent practices and trends}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100016}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100016}, doi = {10.1016/J.CSA.2023.100016}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/JavaidHSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/KumarAB23, author = {C. Madan Kumar and Ruhul Amin and M. Brindha}, title = {Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100013}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100013}, doi = {10.1016/J.CSA.2023.100013}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/KumarAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/LaiSWL23, author = {Jinshan Lai and Xiaotong Song and Ruijin Wang and Xiong Li}, title = {Edge intelligent collaborative privacy protection solution for smart medical}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100010}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100010}, doi = {10.1016/J.CSA.2022.100010}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/LaiSWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/LiT23, author = {Yi Li and Meiqin Tang}, title = {Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100017}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100017}, doi = {10.1016/J.CSA.2023.100017}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/LiT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/LiuLJ23, author = {Dengzhi Liu and Zhimin Li and Dongbao Jia}, title = {Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100004}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100004}, doi = {10.1016/J.CSA.2022.100004}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/LiuLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/MbungeMBM23, author = {Elliot Mbunge and Benhildah Muchemwa and John Batani and Nobuhle Mbuyisa}, title = {A review of deep learning models to detect malware in Android applications}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100014}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100014}, doi = {10.1016/J.CSA.2023.100014}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/MbungeMBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/RajkumarDVR23, author = {S. C. Rajkumar and L. Jegatha Deborah and Pandi Vijayakumar and Karthick K R}, title = {Secure session key pairing and a lightweight key authentication scheme for liable drone services}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100012}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100012}, doi = {10.1016/J.CSA.2022.100012}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/RajkumarDVR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SaiRPN23, author = {Bodicherla Digvijay Sri Sai and Nikhil Ramisetty and Shivangini Prasad and Nenavath Srinivas Naik}, title = {A decentralised {KYC} based approach for microfinance using blockchain technology}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100009}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100009}, doi = {10.1016/J.CSA.2022.100009}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SaiRPN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SattarERDSPKU23, author = {Md Rahat Ibne Sattar and Md. Thowhid Bin Hossain Efty and Taiyaba Shadaka Rafa and Tusar Das and Md Sharif Samad and Abhijit Pathak and Mayeen Uddin Khandaker and Md Habib Ullah}, title = {An advanced and secure framework for conducting online examination using blockchain method}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100005}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100005}, doi = {10.1016/J.CSA.2022.100005}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SattarERDSPKU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SenapatiR23, author = {Biswa Ranjan Senapati and Bharat S. Rawal}, title = {Quantum communication with {RLP} quantum resistant cryptography in industrial manufacturing}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100019}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100019}, doi = {10.1016/J.CSA.2023.100019}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SenapatiR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SheikM23, author = {Syed Amma Sheik and Amutha Prabakar Muniyandi}, title = {Secure authentication schemes in cloud computing with glimpse of artificial neural networks: {A} review}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100002}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100002}, doi = {10.1016/J.CSA.2022.100002}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SheikM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SinghKM23, author = {Anjali Singh and Marimuthu Karuppiah and Rajendra Prasad Mahapatra}, title = {Cryptanalysis on "a secure three-factor user authentication and key agreement protocol for {TMIS} with user anonymity "}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100008}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100008}, doi = {10.1016/J.CSA.2022.100008}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SinghKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/Tan23, author = {Haowen Tan}, title = {An efficient IoT group association and data sharing mechanism in edge computing paradigm}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100003}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100003}, doi = {10.1016/J.CSA.2022.100003}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/Tan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ThapliyalSWSD23, author = {Siddhant Thapliyal and Shubham Singh and Mohammad Wazid and Devesh Pratap Singh and Ashok Kumar Das}, title = {Design of blockchain-enabled secure smart health monitoring system and its testbed implementation}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100020}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100020}, doi = {10.1016/J.CSA.2023.100020}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ThapliyalSWSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/VijayalakshmiBGT23, author = {S. Vijayalakshmi and S. Bose and Logeswari Govindaraj and Anitha Thangasamy}, title = {Hybrid defense mechanism against malicious packet dropping attack for {MANET} using game theory}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100011}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100011}, doi = {10.1016/J.CSA.2022.100011}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/VijayalakshmiBGT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/XuLPF23, author = {Zhiyan Xu and Min Luo and Cong Peng and Qi Feng}, title = {Sanitizable signature scheme with privacy protection for electronic medical data sharing}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100018}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2023.100018}, doi = {10.1016/J.CSA.2023.100018}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/XuLPF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/YanJ23, author = {Weiwei Yan and Sai Ji}, title = {A secure and efficient {DSSE} scheme with constant storage costs in smart devices}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100006}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100006}, doi = {10.1016/J.CSA.2022.100006}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/YanJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ZhouLWL23, author = {Yousheng Zhou and Xia Li and Ming Wang and Yuanni Liu}, title = {{PPT-LBS:} Privacy-preserving top-k query scheme for outsourced data of location-based services}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100007}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100007}, doi = {10.1016/J.CSA.2022.100007}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ZhouLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.