- Dolendro Singh Laiphrakpam, Akash Lahoty, Chanubala Devi, Deepjoy Dey, Punyabrat Saikai, Khumukcham Sonam Devi, Motilal Singh Khoirom:
Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system. J. Inf. Secur. Appl. 83: 103793 (2024) - Dolendro Singh Laiphrakpam, Rohit Thingbaijam, Ripon Patgiri, Motilal Singh Khoirom:
Cryptanalysis of cross-coupled chaotic maps multi-image encryption scheme. J. Inf. Secur. Appl. 80: 103694 (2024) - Siamak Layeghy, Marcus Gallagher, Marius Portmann:
Benchmarking the benchmark - Comparing synthetic and real-world Network IDS datasets. J. Inf. Secur. Appl. 80: 103689 (2024) - Xuelian Li, Zhuohao Chen, Juntao Gao:
Ciphertext face recognition system based on secure inner product protocol. J. Inf. Secur. Appl. 80: 103681 (2024) - Quanrun Li, Debiao He, Yitao Chen, Jiaming Wen, Zhichao Yang:
An efficient quantum-resistant undeniable signature protocol for the E-voting system. J. Inf. Secur. Appl. 81: 103714 (2024) - Yanjun Li, Hao Lin, Xinjie Bi, Shanshan Huo, Yiyi Han:
MILP-based differential cryptanalysis on full-round shadow. J. Inf. Secur. Appl. 81: 103696 (2024) - Wenjuan Li, Philip Rosenberg, Mads Glisby, Michael Han:
Designing energy-aware collaborative intrusion detection in IoT networks. J. Inf. Secur. Appl. 81: 103713 (2024) - Shuangcheng Li, Zhangguo Tang, Huanzhou Li, Jian Zhang, Han Wang, Junfeng Wang:
GMADV: An android malware variant generation and classification adversarial training framework. J. Inf. Secur. Appl. 84: 103800 (2024) - Ruonan Lin, Yikun Huang, Yuanyuan Zhang, Renwan Bi, Jinbo Xiong:
Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing. J. Inf. Secur. Appl. 85: 103854 (2024) - Yijie Lin, Chia-Chen Lin, Jui-Chuan Liu, Chin-Chen Chang:
Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix. J. Inf. Secur. Appl. 80: 103679 (2024) - Shuanggen Liu, Yingzi Hu, Xu An Wang, Xukai Liu, Yuqing Yin, Teng Wang:
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing. J. Inf. Secur. Appl. 84: 103803 (2024) - Huipeng Liu, Lin Teng, Salahuddin Unar, Pengbo Liu, Xingyuan Wang:
Fingerprint image encryption based on chaos and nonlinear dynamic "X" model diffusion. J. Inf. Secur. Appl. 82: 103723 (2024) - Yuming Liu, Yong Wang, Hao Feng:
A novel link fabrication attack detection method for low-latency SDN networks. J. Inf. Secur. Appl. 84: 103807 (2024) - Junming Liu, Yuntao Zhao, Yongxin Feng, Yutao Hu, Xiangyu Ma:
SeMalBERT: Semantic-based malware detection with bidirectional encoder representations from transformers. J. Inf. Secur. Appl. 80: 103690 (2024) - Zuquan Liu, Guopu Zhu, Yu Zhang, Hongli Zhang, Sam Kwong:
An efficient cheating-detectable secret image sharing scheme with smaller share sizes. J. Inf. Secur. Appl. 81: 103709 (2024) - Giacomo Longo, Francesco Lupia, Andrea Pugliese, Enrico Russo:
Physics-aware targeted attacks against maritime industrial control systems. J. Inf. Secur. Appl. 82: 103724 (2024) - Shengyang Luo, Yaqi Liu, Xuehu Yan, Yuyuan Sun:
Robust secret color image sharing anti-cropping and tampering in shares. J. Inf. Secur. Appl. 85: 103869 (2024) - Lieyu Lv, Ling Xiong, Fagen Li:
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption. J. Inf. Secur. Appl. 84: 103805 (2024) - Chao Ma, Haiying Gao, Bin Hu:
Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices. J. Inf. Secur. Appl. 84: 103822 (2024) - Mahima Mary Mathews, Panchami V:
QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks. J. Inf. Secur. Appl. 83: 103787 (2024) - Pavani Meesala, Moumita Roy, Dalton Meitei Thounaojam:
A robust medical image zero-watermarking algorithm using Collatz and Fresnelet Transforms. J. Inf. Secur. Appl. 85: 103855 (2024) - Lívia Maria Bettini de Miranda, Rodrigo Dutra Garcia, Gowri Sankar Ramachandran, Jo Ueyama, Fábio Müller Guerrini:
Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making. J. Inf. Secur. Appl. 85: 103837 (2024) - Caio C. Moreira, Davi C. Moreira, Claudomiro Sales:
A comprehensive analysis combining structural features for detection of new ransomware families. J. Inf. Secur. Appl. 81: 103716 (2024) - Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks. J. Inf. Secur. Appl. 84: 103797 (2024) - Alan Paul, Vishal Sharma, Oluwafemi Olukoya:
SQL injection attack: Detection, prioritization & prevention. J. Inf. Secur. Appl. 85: 103871 (2024) - Ye Peng, Qi Yu, Guobin Fu, Wenwen Zhang, Chaofan Duan:
Improving the robustness of steganalysis in the adversarial environment with Generative Adversarial Network. J. Inf. Secur. Appl. 82: 103743 (2024) - Diana-Elena Petrean, Rodica Potolea:
Homomorphic encrypted Yara rules evaluation. J. Inf. Secur. Appl. 82: 103738 (2024) - Mounika Pratapa, Aleksander Essex:
Secure similar patients query with homomorphically evaluated thresholds. J. Inf. Secur. Appl. 85: 103861 (2024) - Komal Pursharthi, Dheerendra Mishra:
Towards post-quantum authenticated key agreement scheme for mobile devices. J. Inf. Secur. Appl. 82: 103754 (2024) - Jianxiang Qi, Ning Zheng, Ming Xu, Ping Chen, Wenqiang Li:
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks. J. Inf. Secur. Appl. 81: 103699 (2024)