![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 332 matches
- 2024
- Mohammed Riyadh Abdmeziem
, Hiba Akli, Rima Zourane:
Nodes selection review for federated learning in the blockchain-based internet of things. Secur. Priv. 7(2) (2024) - V. V. L. Divakar Allavarpu, Vankamamidi Srinivasa Naresh
, A. Krishna Mohan:
Privacy-preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. Secur. Priv. 7(3) (2024) - Subhas Barman
, Samiran Chattopadhyay, Debasis Samanta:
Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment. Secur. Priv. 7(1) (2024) - Harini Bilakanti, Sreevani Pasam, Varshini Palakollu, Sairam Utukuru
:
Anomaly detection in IoT environment using machine learning. Secur. Priv. 7(3) (2024) - Abhishek Bisht, Ashok Kumar Das
, Debasis Giri
:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey. Secur. Priv. 7(2) (2024) - Umesh Bodkhe, Sudeep Tanwar
:
V2XCom: Lightweight and secure message dissemination scheme for Internet of vehicles. Secur. Priv. 7(2) (2024) - Priyabrata Dash
, Monalisa Sarma, Debasis Samanta:
Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications. Secur. Priv. 7(3) (2024) - Martijn Dekker, Lampis Alevizos
:
A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. Secur. Priv. 7(1) (2024) - Kunal Demla, Ashima Anand
:
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps. Secur. Priv. 7(3) (2024) - Archan Dhadhania, Jitendra Bhatia
, Rachana Mehta
, Sudeep Tanwar
, Ravi Sharma, Amit Verma:
Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions. Secur. Priv. 7(1) (2024) - Ikram Ud Din
, Wajahat Ali
, Ahmad Almogren
, Iehab Al Rassan, Sherali Zeadally
:
Using smart grid infrastructure for authentication and data management in Internet of Medical Things. Secur. Priv. 7(3) (2024) - Sangeeta Gupta
, Premkumar Chithaluru
, May El Barachi
, Manoj Kumar
:
Secure data access using blockchain technology through IoT cloud and fabric environment. Secur. Priv. 7(2) (2024) - Heba A. Hassan
, Ezz El-Din Hemdan
, Walid El-Shafai
, Mona Shokair
, Fathi E. Abd El-Samie
:
Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods. Secur. Priv. 7(2) (2024) - P. P. Hema
, Anchare V. Babu
:
Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks. Secur. Priv. 7(3) (2024) - Zhongming Huang
, Feng Wang, Chin-Chen Chang
, Xiuqiang Chen:
A new authentication scheme for dynamic charging system of electric vehicles in fog environment. Secur. Priv. 7(3) (2024) - Md. Azharul Islam, Sanjay Madria
:
Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation. Secur. Priv. 7(1) (2024) - Mubeen Javed, Muhammad Arslan Akram
, Adnan Noor Mian, Saru Kumari
:
On the security of a novel privacy-preserving authentication scheme for V2G networks. Secur. Priv. 7(2) (2024) - Vijay Karnatak, Amit Kumar Mishra
, Neha Tripathi
, Mohammad Wazid
, Jaskaran Singh, Ashok Kumar Das
:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. Secur. Priv. 7(2) (2024) - Osamah Ibrahim Khalaf
, Ashokkumar S. R, Sameer Algburi, Anupallavi S, Dhanasekaran Selvaraj, Mhd Saeed Sharif
, Wael Elmedany:
Federated learning with hybrid differential privacy for secure and reliable cross-IoT platform knowledge sharing. Secur. Priv. 7(3) (2024) - Mohammed Rauf Ali Khan
:
Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. Secur. Priv. 7(1) (2024) - Parikshith Nayaka Sheetakallu Krishnaiah, Dayanand Lal Narayan, Kartick Sutradhar
:
A survey on secure metadata of agile software development process using blockchain technology. Secur. Priv. 7(2) (2024) - Animesh Kumar, Sandip Dutta, Prashant Pranav
:
Analysis of SQL injection attacks in the cloud and in WEB applications. Secur. Priv. 7(3) (2024) - Pawan Kumar
, Sukhdip Singh:
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis. Secur. Priv. 7(2) (2024) - Ravi Kumar, Samayveer Singh
, Deepti Singh, Mohit Kumar, Sukhpal Singh Gill
:
A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks. Secur. Priv. 7(1) (2024) - Indu Kumari, Pranav Kumar Singh
, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. Secur. Priv. 7(1) (2024) - Ruiqi Li, Fupeng Li, Peng Xu, Shuiting Du, Bingling Gu
:
Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm. Secur. Priv. 7(3) (2024) - Hela Makina
, Asma Ben Letaifa, Abderrezak Rachedi
:
Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. Secur. Priv. 7(2) (2024) - Yassine Mekdad
, Ahmet Aris, Abbas Acar
, Mauro Conti
, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024) - Ankita Mishra
, Mohammad S. Obaidat, Dheerendra Mishra
:
Privacy preserving content distribution framework for multidistributor DRM systems. Secur. Priv. 7(1) (2024) - Vankamamidi Srinivasa Naresh
, Sivaranjani Reddi:
An identity-based secure VANET communication system. Secur. Priv. 7(2) (2024)
skipping 302 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-28 08:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint