default search action
EURASIP Journal on Information Security, Volume 2016
Volume 2016, 2016
- Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov process-based retrieval for encrypted JPEG images. 1 - Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi, Hyoungshick Kim:
Combating online fraud attacks in mobile-based advertising. 2 - Thijs Laarhoven:
Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders. 3 - Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu:
A landmark calibration-based IP geolocation approach. 4 - Hansong Xu, Kun Hua:
Secured ECG signal transmission for human emotional stress classification in wireless body area networks. 5
- Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda:
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting. 6
- Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang, Mingjie Chen:
A new usage control protocol for data protection of cloud environment. 7
- Raphael C. S. Machado, Davidson R. Boccardo, Vinícius Gusmão Pereira de Sá, Jayme Luiz Szwarcfiter:
Software control and intellectual property protection in cyber-physical systems. 8
- Ankit Kumar Jain, Brij B. Gupta:
A novel approach to protect against phishing attacks at client side using auto-updated white-list. 9 - Naoya Torii, Hirotaka Kokubo, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka, Tsutomu Matsumoto:
ASIC implementation of random number generators using SR latches and its evaluation. 10 - Majid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk:
An efficient privacy-preserving comparison protocol in smart metering systems. 11
- Pramodh Krishna D., Venu Gopal Rao K.:
Generalized weighted tree similarity algorithms for taxonomy trees. 12 - Sheren A. El-Booz, Gamal Attiya, Nawal A. El-Fishawy:
A secure cloud storage system combining time-based one-time password and automatic blocker protocol. 13 - Shuhui Zhang, Xiangxu Meng, Lianhai Wang:
An adaptive approach for Linux memory analysis based on kernel code reconstruction. 14 - Khadijah Bahwaireth, Lo'ai Tawalbeh, Elhadj Benkhelifa, Yaser Jararweh, Mohammad Tawalbeh:
Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications. 15
- Yumna Ghazi, Rahat Masood, Abid Rauf, Muhammad Awais Shibli, Osman Hassan:
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases. 16 - Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser, Georg Sigl:
A flexible framework for mobile device forensics based on cold boot attacks. 17 - Johanna Ullrich, Jordan Cropper, Peter Frühwirt, Edgar R. Weippl:
The role and security of firewalls in cyber-physical cloud computing. 18 - Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul:
Adaptive identity and access management - contextual data based policies. 19
- Qilin Qi, Dongming Peng, Hamid Sharif:
DST approach to enhance audio quality on lost audio packet steganography. 20 - Andreas Unterweger, Fabian Knirsch, Günther Eibl, Dominik Engel:
Privacy-preserving load profile matching for tariff decisions in smart grids. 21 - Nedim Srndic, Pavel Laskov:
Hidost: a static machine-learning-based detector of malicious files. 22
- Qing Wang, Rong Zhang:
Double JPEG compression forensics based on a convolutional neural network. 23 - Johannes Kotzerke, Hao Hao, Stephen A. Davis, Robert Hayes, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Kathy J. Horadam:
Identification performance of evidential value estimation for ridge-based biometrics. 24 - Peter Wild, Heinz Hofbauer, James M. Ferryman, Andreas Uhl:
Quality-based iris segmentation-level fusion. 25
- Christian Rathgeb, Benjamin Tams, Johannes Wagner, Christoph Busch:
Unlinkable improved multi-biometric iris fuzzy vault. 26 - Brij B. Gupta, Shingo Yamaguchi, Pethuru Raj Chelliah:
Guest editorial special issues on security trends in mobile cloud computing, web, and social networking. 27 - Konstantin Böttinger:
Fuzzing binaries with Lévy flight swarms. 28
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.