default search action
Journal of Information Security and Applications, Volume 75
Volume 75, June 2023
- Edlira Dushku, Md Masoom Rabbani, Jo Vliegen, An Braeken, Nele Mentens:
PROVE: Provable remote attestation for public verifiability. 103448 - Roberto De Prisco, Alfredo De Santis, Delfina Malandrino, Rocco Zaccagnino:
An improved privacy attack on smartphones exploiting the accelerometer. 103479 - Hui Cui, Zhiguo Wan, Huayi Qi, Baodong Qin, Xun Yi:
Password-authenticated proofs of retrievability for multiple devices checking cloud data. 103480 - Jinghui Zhang, Boxi Liang, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang:
Mobile applications identification using autoencoder based electromagnetic side channel analysis. 103481 - Sourav Bera, Suryakant Prasad, Y. Sreenivasa Rao, Ashok Kumar Das, Youngho Park:
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment. 103482 - Nai Wang, Junjun Chen, Di Wu, Wencheng Yang, Yong Xiang, Atul Sajjanhar:
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things. 103483 - Hengyan Zhang, Weizhe Zhang, Yuming Feng, Yang Liu:
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction. 103484 - Zamineh Najafi, Shahram Babaie:
A lightweight hierarchical key management approach for internet of things. 103485 - Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
AIM: An Android Interpretable Malware detector based on application class modeling. 103486 - Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong, Shuang Bao, Lanlan Wang:
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme. 103487 - Huifang Yu, Wenxuan Hui:
Certificateless ring signature from NTRU lattice for electronic voting. 103496 - Sabarathinam Chockalingam, Wolter Pieters, André M. H. Teixeira, Pieter H. A. J. M. van Gelder:
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures. 103497 - Jatin Arora, Ketti Ramchandran Ramkumar, Sathiyaraj R, G. S. Pradeep Ghantasala:
Securing web documents by using piggybacked framework based on Newton's forward interpolation method. 103498 - Masahito Ishizaka, Kazuhide Fukushima:
Wildcarded identity-based ring signatures based on linearly homomorphic signatures. 103499 - Muqadar Ali, Hongjie He, Abid Hussain, Mehboob Hussain, Yuan Yuan:
Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing. 103500 - Patricio Zambrano, Jenny Torres, Luis Tello-Oquendo, Ángel Yánez, Luis Velásquez:
On the modeling of cyber-attacks associated with social engineering: A parental control prototype. 103501 - Johannes Schneider, Giovanni Apruzzese:
Dual adversarial attacks: Fooling humans and classifiers. 103502 - Shuitao Guo, Shijie Zhu, Changqing Zhu, Na Ren, Wei Tang, Dingjie Xu:
A robust and lossless commutative encryption and watermarking algorithm for vector geographic data. 103503 - Ruizhong Du, Na Liu, Mingyue Li, Junfeng Tian:
Block verifiable dynamic searchable encryption using redactable blockchain. 103504 - Purva Rewal, Mrityunjay Singh, Dheerendra Mishra, Komal Pursharthi, Ankita Mishra:
Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices. 103505 - Priyabrata Dash, Fagul Pandey, Monalisa Sarma, Debasis Samanta:
Efficient private key generation from iris data for privacy and security applications. 103506 - Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Yaofei Wang:
Robust audio copy-move forgery detection on short forged slices using sliding window. 103507 - Jiaqi Chen, Chong Yuan, Jiashuo Li, Donghai Tian, Rui Ma, Xiaoqi Jia:
ELAMD: An ensemble learning framework for adversarial malware defense. 103508 - Ana Paula Vazão, Leonel Santos, Rogério Luís C. Costa, Carlos Rabadão:
Implementing and evaluating a GDPR-compliant open-source SIEM solution. 103509 - Wen Chang, Zhen-Zhen Li, Fu-Cheng You, Xing-Bo Pan:
Dynamic quantum fully homomorphic encryption scheme based on universal quantum circuit. 103510 - Zhaorui Ma, Shicheng Zhang, Xinhao Hu, Na Li, Qinglei Zhou, Fenlin Liu, Hongjian Wang, Guangwu Hu, Qilin Dong:
GWS-Geo: A graph neural network based model for street-level IPv6 geolocation. 103511 - Yihao Wang, Ru Zhang, Jianyi Liu:
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length. 103512 - Xin Hou, Xiaofeng Jia, Jun Shao:
Public key encryption with public-verifiable decryption delegation and its application. 103513 - Xiaofeng Shen, Heng Yao, Shunquan Tan, Chuan Qin:
VHNet: A Video Hiding Network with robustness to video coding. 103515 - Pengcheng Luo, Jian Chu, Genke Yang:
IP packet-level encrypted traffic classification using machine learning with a light weight feature engineering method. 103519 - Xiaotian Wu, Ching-Nung Yang, Hong-Wu Cai, Yanxiao Liu:
A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding. 103520 - Ming Xia, Jiyou Chen, Gaobo Yang, Shuai Wang:
Robust detection of seam carving with low ratio via pixel adjacency subtraction and CNN-based transfer learning. 103522
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.