


default search action
Journal of Information Security and Applications, Volume 73
Volume 73, March 2023
- Jiarui Yu
, Jingsong Cui, Hang Tu, Chunwu Yu, Man Zhou:
A SM2 based efficient and lightweight batch verification approach for IC cards. 103409 - Bolun Wu
, Futai Zou, Chengwei Zhang, Tangda Yu, Yun Li:
Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network. 103411 - Gadde Swetha, J. Amutharaj, S. Usha:
A security model to protect the isolation of medical data in the cloud using hybrid cryptography. 103412 - Ching-Nung Yang
, Peng Li
, Hsin-Chuan Kuo:
(k, n) secret image sharing scheme with privileged set. 103413 - Jung-San Lee
, Ying-Chin Chen, Chit-Jie Chew, Wei-Che Hung
, Yun-Yi Fan, Bo Li:
Constructing gene features for robust 3D mesh zero-watermarking. 103414 - Amina Msolli, Nader Ajmi
, Abdelhamid Helali, Abdelaziz Gassoumi, Hassen Maaref, Ridha Mghaieth:
New key management scheme based on pool-hash for WSN and IoT. 103415 - Xiaobing Sun
, Liangqiong Tu, Jiale Zhang
, Jie Cai, Bin Li, Yu Wang
:
ASSBert: Active and semi-supervised bert for smart contract vulnerability detection. 103423 - Joel Höglund
, Martin Furuhed, Shahid Raza
:
Lightweight certificate revocation for low-power IoT with end-to-end security. 103424 - Xiaoyu Zhou
, Wien Hong
, Tung-Shou Chen, Guangsong Yang
:
Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques. 103425 - Cheng Guo, Litao Wang, Xinyu Tang, Bin Feng, Guofeng Zhang:
Two-party interactive secure deduplication with efficient data ownership management in cloud storage. 103426 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin
:
Distributed auditing protocol for untraceable transactions. 103429 - Takeshi Koshiba
, Behrouz Zolfaghari
, Khodakhast Bibak
:
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm. 103430 - Anupama Arjun Pandit
, Atul Kumar
, Arun Mishra
:
LWR-based Quantum-Safe Pseudo-Random Number Generator. 103431 - Meryem Soysaldi Sahin
, Sedat Akleylek
:
A survey of quantum secure group signature schemes: Lattice-based approach. 103432 - Lukas Daubner
, Martin Macák, Raimundas Matulevicius, Barbora Buhnova, Sofija Maksovic
, Tomás Pitner:
Addressing insider attacks via forensic-ready risk management. 103433 - Krunal Randive
, R. Mohan, Ambairam Muthu Sivakrishna
:
An efficient pattern-based approach for insider threat classification using the image-based feature representation. 103434 - Anmol Kumar
, Gaurav Somani
:
Service separation assisted DDoS attack mitigation in cloud targets. 103435 - Zheng Wang, Bin Liu
, Jingzhao Chen
, Weihua Huang, Yong Hu:
Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game. 103436 - Junyan Guo
, Ye Du
, Dawei Zhang
, Runfang Wu:
PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network. 103437 - Jintong Sun
, Fucai Zhou, Qiang Wang, Zi Jiao
, Yun Zhang
:
Flexible revocation and verifiability for outsourced Private Set Intersection computation. 103438 - Jun Li
, Minqing Zhang, Ke Niu, Xiaoyuan Yang:
Investigation on principles for cost assignment in motion vector-based video steganography. 103439 - Zhangdong Wang, Jiaohua Qin
, Xuyu Xiang, Yun Tan
, Jia Peng:
A privacy-preserving cross-media retrieval on encrypted data in cloud computing. 103440 - Meng Zhao, Yong Ding
, Shijie Tang, Hai Liang
, Changsong Yang
, Huiyong Wang:
Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data. 103441 - Lin Yang, Dawen Xu
, Rangding Wang, Songhan He:
Adaptive HEVC video steganography based on distortion compensation optimization. 103442 - Suhui Liu
, Liquan Chen
, Hongtao Yu, Shang Gao, Huiyu Fang
:
BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT. 103443 - Vishal A. Thakor
, Mohammad Abdur Razzaque
, Anand D. Darji
, Aksh R. Patel:
A novel 5-bit S-box design for lightweight cryptography algorithms. 103444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.