Sign in
Secur. Priv.
2018
2020
2021
2023
2018
2023
Keyphrases
Publications
volume 6, number 1, 2023
Pimal Khanpara
,
Kruti Lavingia
,
Rajvi Trivedi
,
Sudeep Tanwar
,
Amit Verma
,
Ravi Sharma
A context-aware internet of things-driven security scheme for smart homes.
Secur. Priv.
6 (1) (2023)
Kaushal Shah
,
Sarth Kanani
,
Shivam Patel
,
Manan Devani
,
Sudeep Tanwar
,
Amit Verma
,
Ravi Sharma
Blockchain-based object detection scheme using federated learning.
Secur. Priv.
6 (1) (2023)
Palak Chandrakar
,
Rashi Bagga
,
Yogesh Kumar
,
Sanjeev Kumar Dwivedi
,
Ruhul Amin
Blockchain based security protocol for device to device secure communication in internet of things networks.
Secur. Priv.
6 (1) (2023)
C. Madan Kumar
,
Ruhul Amin
,
M. Brindha
Cryptanalysis and improvement of REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system.
Secur. Priv.
6 (1) (2023)
Guglielmo Maccario
,
Maurizio Naldi
Privacy in smart speakers: A systematic literature review.
Secur. Priv.
6 (1) (2023)
Emanuela Marasco
,
Massimiliano Albanese
,
Venkata Vamsi Ram Patibandla
,
Anudeep Vurity
,
Sumanth Sai Sriram
Biometric multi-factor authentication: On the usability of the FingerPIN scheme.
Secur. Priv.
6 (1) (2023)
Munmun Bhattacharya
,
Sandip Roy
,
Samiran Chattopadhyay
,
Ashok Kumar Das
,
Sachin Shetty
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Secur. Priv.
6 (1) (2023)
Shanil Sharma
,
Dheerendra Mishra
,
Saurabh Rana
A privacy oriented authorized key agreement framework for vehicular edge computing.
Secur. Priv.
6 (1) (2023)
Egide Nkurunziza
,
Lawrence Tandoh
,
Issameldeen Elfadul
,
Fagen Li
ECAAP-SG: Efficient certificateless anonymous authentication protocol for SG.
Secur. Priv.
6 (1) (2023)
Ashutosh Aithekar
,
Pratik Gupta
,
Dharminder Dharminder
A provably secure, shortest, and efficient identity based signcryption technique in the standard model.
Secur. Priv.
6 (1) (2023)
Fatima Salahdine
,
Tao Han
,
Ning Zhang
Security in 5G and beyond recent advances and future challenges.
Secur. Priv.
6 (1) (2023)
Hamidreza Damghani
,
Soheila Estaji
,
Leila Damghani
Providing robust and reversible watermarking algorithm and detection of malicious manipulation.
Secur. Priv.
6 (1) (2023)
volume 6, number 2, 2023
Ruijun Wang
Convergence model of "cloud + VR" technology on account of mobile Internet of Things and exhibition industry.
Secur. Priv.
6 (2) (2023)
Yunhui Hao
Intelligent control of electric automation instrumentation based on blockchain.
Secur. Priv.
6 (2) (2023)
Liping Wang
Financial risk analysis system and supervision based on big data and blockchain technology.
Secur. Priv.
6 (2) (2023)
Baorui Cai
,
Bin Zhang
,
Jinding He
,
Rongkui Zhang
,
Wenlin Yan
The risks brought by blockchain applications to the safe operation of power grids.
Secur. Priv.
6 (2) (2023)
Lin Wang
Optimization algorithm of digital media sharing platform based on blockchain technology.
Secur. Priv.
6 (2) (2023)
Jingdong Zhou
Information construction of construction project management based on internet of things blockchain.
Secur. Priv.
6 (2) (2023)
Haiping Yu
Application of blockchain technology in the data processing security system of financial enterprises.
Secur. Priv.
6 (2) (2023)
Lei Hu
Implementation of the expansion of sensor information storage based on the Internet of Things and cloud computing.
Secur. Priv.
6 (2) (2023)
Alireza Souri
,
Eyhab Al-Masri
,
Saru Kumari
Blockchain architecture and methodologies for internet of things environment.
Secur. Priv.
6 (2) (2023)
Juanling Wang
Research on the construction of accounting information audit quality control system based on blockchain.
Secur. Priv.
6 (2) (2023)
Qiang Li
Evaluation of enterprise financial investment environment based on block-chain and cloud computing.
Secur. Priv.
6 (2) (2023)
Erni Zhang
Economic supply chain management of advanced manufacturing industry based on blockchain technology.
Secur. Priv.
6 (2) (2023)
Rongxia Wang
,
Zhifang Liu
,
Fen He
,
Weihuang Yang
Protection and detection of physical hazards for the intelligent system under industrial Internet of Things by neural network.
Secur. Priv.
6 (2) (2023)
Baicheng Zhang
The strategy guidance of business English intercultural communication based on blockchain security and genetic algorithms.
Secur. Priv.
6 (2) (2023)
Yue Wang
Import and export trade forecasting algorithm based on blockchain security and PSO optimized hybrid RVM model.
Secur. Priv.
6 (2) (2023)
Yeping Zhen
Design of library smart cloud service system based on blockchain technology.
Secur. Priv.
6 (2) (2023)
Jinfeng Zhang
,
Dongdong Zhang
Internet of things network intrusion detection model based on quantum artificial fish group and fuzzy kernel clustering algorithm.
Secur. Priv.
6 (2) (2023)
volume 5, number 5, 2022
Shakila Bu-Pasha
Legal aspects, public interest, and legitimate interest in processing personal data to operate autonomous buses in the regular transportation system.
Secur. Priv.
5 (5) (2022)
Somesh Banerjee
,
Khilesh Kumar
,
Prajwal Masulkar
,
Ruhul Amin
,
Sanjeev Kumar Dwivedi
Blockchain and IPFS-based reliable land registry system.
Secur. Priv.
5 (5) (2022)
Blake D. Bryant
,
Hossein Saiedian
Key challenges in security of IoT devices and securing them with the blockchain technology.
Secur. Priv.
5 (5) (2022)
Steffie Maria Stephen
,
Arunita Jaekel
Roadside unit-based pseudonym authentication in vehicular ad hoc network.
Secur. Priv.
5 (5) (2022)
Boubakeur Annane
,
Adel Alti
,
Lamri Laouamer
,
Hamza Reffad
Cx-CP-ABE: Context-aware attribute-based access control schema and blockchain technology to ensure scalable and efficient health data privacy.
Secur. Priv.
5 (5) (2022)
Siranjeevi Rajamanickam
,
Satyanarayana Vollala
,
Natarajan Ramasubramanian
EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario.
Secur. Priv.
5 (5) (2022)
Vasileios Germanos
,
Wen Zeng
Model-based risk assessment evaluation.
Secur. Priv.
5 (5) (2022)
Neha Garg
,
Mohammad Wazid
,
Jaskaran Singh
,
Devesh Pratap Singh
,
Ashok Kumar Das
Security in IoMT-driven smart healthcare: A comprehensive review and open challenges.
Secur. Priv.
5 (5) (2022)
Ravi Bairagi
,
Preetesh Purohit
,
Kailash Chandra Bandhu
,
Ratnesh Litoriya
A secure and efficient mechanism for scheduling tasks in cloud computing environments.
Secur. Priv.
5 (5) (2022)
volume 5, number 6, 2022
Preetam Mukherjee
,
Anirban Sengupta
,
Chandan Mazumdar
"Security Gap" as a metric for enterprise business processes.
Secur. Priv.
5 (6) (2022)
Shubham Rana
,
Nitesh Kumar
,
Anand Handa
,
Sandeep K. Shukla
Automated Windows behavioral tracing for malware analysis.
Secur. Priv.
5 (6) (2022)
May Almousa
,
Tianyang Zhang
,
Abdolhossein Sarrafzadeh
,
Mohd Anwar
Phishing website detection: How effective are deep learning-based models and hyperparameter optimization?
Secur. Priv.
5 (6) (2022)
N. Renugadevi
,
Shirisha Thangallapally
,
Sai Charan Vemula
,
Stheya Julakanti
,
Somya Bhatnagar
Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array-A survey.
Secur. Priv.
5 (6) (2022)
Murat Güzeltepe
,
Selda Çalkavur
Skew-cyclic codes based public-key cryptosystem approach.
Secur. Priv.
5 (6) (2022)
Shivansh Kumar
,
Ruhul Amin
Decentralized trade finance using blockchain and lightning network.
Secur. Priv.
5 (6) (2022)
Shyam Saurabh
,
Kishore Sinha
Perfect secret sharing schemes from combinatorial squares.
Secur. Priv.
5 (6) (2022)
Engin Zeydan
,
Yekta Turk
,
Yaman Yagiz Tasbag
Entropy service for secure real-time mission critical communications.
Secur. Priv.
5 (6) (2022)
Mirmorsal Madani
,
Homayun Motameni
,
Hosein Mohamadi
Fake news detection using deep learning integrating feature extraction, natural language processing, and statistical descriptors.
Secur. Priv.
5 (6) (2022)
Shreya Patel
,
Rinku Dewri
Private record linkage with linkage maps.
Secur. Priv.
5 (6) (2022)
Mohamad Mulham Belal
,
Tanmoy Maitra
,
Debasis Giri
,
Ashok Kumar Das
Chaotic neural networks and farfalle construction based parallel keyed secure hash function.
Secur. Priv.
5 (6) (2022)
Dharminder Dharminder
,
Ankur Nehra
,
Aditya Arya
A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication system.
Secur. Priv.
5 (6) (2022)