Sign in
Int. J. Inf. Comput. Secur.
2007
2012
2018
2023
2007
2023
Keyphrases
Publications
volume 22, number 1, 2023
Zhijun Wu
,
Chenlei Zhang
,
Junjun Guo
A method of speech information hiding in inactive frame based on pitch modulation.
Int. J. Inf. Comput. Secur.
22 (1) (2023)
Synim Selimi
,
Blerim Rexha
,
Kamer Vishi
CyberNFTs: conceptualising a decentralised and reward-driven intrusion detection system with ML.
Int. J. Inf. Comput. Secur.
22 (1) (2023)
M. H. Abhilash
,
B. B. Amberker
Dynamic group signature scheme using ideal lattices.
Int. J. Inf. Comput. Secur.
22 (1) (2023)
Muhammad Kashif Azhar
,
Bin Yao
,
Zhongpu Chen
Enriching blockchain with spatial keyword query processing.
Int. J. Inf. Comput. Secur.
22 (1) (2023)
Bhanu Chander
,
Kumaravelan Gopalakrishnan
Outlier detection in WSN with SVDD via multi-interpolation auto-encoder.
Int. J. Inf. Comput. Secur.
22 (1) (2023)
volume 22, number 2, 2023
Oualid Demigha
,
Nabil Haddad
Formal verification of software-only mechanisms for live migration of SGX enclaves.
Int. J. Inf. Comput. Secur.
22 (2) (2023)
Dilip Kumar
,
Manoj Kumar
Outsourcing decryption of KP-ABE using elliptic curve cryptography.
Int. J. Inf. Comput. Secur.
22 (2) (2023)
Ancy Sherin Jose
,
Latha R. Nair
,
Varghese Paul
Tree derived feature importance and Bayesian optimisation for improved multi-class classification of DDoS attacks in software defined networks.
Int. J. Inf. Comput. Secur.
22 (2) (2023)
Lijiao Chen
,
Kewei Lv
Ciphertext-policy attribute-based delay encryption.
Int. J. Inf. Comput. Secur.
22 (2) (2023)
Lizhe Zhang
,
Zhuoning Bai
,
Zhijun Wu
,
Kenian Wang
Unified identity authentication scheme of system wide information management based on SAML-PKI-LDAP.
Int. J. Inf. Comput. Secur.
22 (2) (2023)
volume 22, number 3/4, 2023
Abiy Tadesse Abebe
,
Yalemzewd Negash Shiferaw
,
P. G. V. Suresh Kumar
Lightweight integrated cryptosystem based on reconfigurable hardware for IoT security.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Santosh Kumar Ravva
,
R. M. Krishna Sureddi
Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
S. Jayashree
,
S. V. N. Santhosh Kumar
A comprehensive survey on effective key management schemes for secured authentication in vehicular ad hoc network.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Shipra Kumari
,
Hrishikesh Mahato
Construction of weighted orthogonal matrices over finite field and its application in cryptography.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Samson Ebenezar Uthirapathy
,
Domnic Sandanam
Sentiment analysis in social network data using multilayer perceptron neural network with hill-climbing meta-heuristic optimisation.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Ruchi Agarwal
,
Manoj Kumar
A privacy preserving scheme for encrypted medical images using RDH.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Umesh Kumar
,
Vadlamudi Ch. Venkaiah
A novel stream cipher based on quasigroups and QG-PRNG.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Mohammed Almehdhar
,
Mohammed M. Abdelsamea
,
Na Ruan
Deep multi-locality convolutional neural network for DDoS detection in smart home IoT.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Zhenquan Ding
,
Hui Xu
,
Lei Cui
,
Haiqiang Fei
,
Yongji Liu
,
Zhiyu Hao
HEMC: a dynamic behaviour analysis system for malware based on hardware virtualisation.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Ankush Balaram Pawar
,
Shashikant U. Ghumbre
,
Rashmi M. Jogdand
Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
volume 21, number 1/2, 2023
Monika Mathur
,
Nidhi Goel
FPGA implementation of AES encryptor based on rolled and masked approach.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
Akanksha S. Mahajan
,
Pradnya K. Navale
,
Vaishnavi V. Patil
,
Vijay M. Khadse
,
Parikshit N. Mahalle
The hybrid framework of ensemble technique in machine learning for phishing detection.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
Nureni Ayofe Azeez
,
Odejinmi Oluwatobi Samuel
A cyberstalking-free global network with artificial intelligence approach.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
Jing Niu
Design of automatic monitoring system for network information security in cloud computing environment.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
Jay Dave
,
Meghna Bhatt
,
Deep Pancholi
Secure proof of ownership for deduplicated cloud storage system.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
Sunil Gupta
,
Akansha Bansiya
,
Mansi Saini
,
Amuleek Sidhu
Blockchain-based EHR storage and access control system.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
K. K. Amith
,
H. A. Sanjay
,
Ajay Mahadevan
,
K. Harshita
,
D. Eshwar
,
K. Aditya Shastry
Performance driven Hyperledger Fabric-based blockchain framework for mass e-voting in India.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
Thembekile O. Mayayise
BYOD security issues and controls framework: an outcome of a systematic literature review.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
P. L. Chithra
,
R. Aparna
Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
K. Abhimanyu Kumar Patro
,
Bibhudendra Acharya
An efficient two-level image encryption system using chaotic maps.
Int. J. Inf. Comput. Secur.
21 (1/2) (2023)
volume 21, number 3/4, 2023
Zareen Tasneem
,
Maria Afnan
,
Md. Arman Hossain
,
Md. Mahbubur Rahman
,
Samrat Kumar Dey
Performance evaluation of various deep convolutional neural network models through classification of malware.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
Kheira Lakel
,
Fatima Bendella
A bio-inspired algorithm for enhancing DNA cryptography.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
Shadi Rasheed Masadeh
,
Hamza Abbass Al-Sewadi
,
Mohammed Abbas Fadhil Al-Husainy
A message encryption scheme inspired by Sudoku puzzle.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
Ranjeet Kumar Ranjan
,
Amit Singh
A comparative study of deep transfer learning models for malware classification using image datasets.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
S. P. Ramya
,
Rajagopal Eswari
A shallow-based neural network model for fake news detection in social networks.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
Swapnil Sutar
,
Vikas Tiwari
,
Ajeet Singh
Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
Justice Odoom
,
Xiaofang Huang
,
Richlove Samuel Soglo
JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
Yuvraj Singh Malhi
,
Virendra Singh Shekhawat
Two-level machine learning driven intrusion detection model for IoT environments.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
N. D. Patel
,
B. M. Mehtre
,
Rajeev Wankar
Artificial neural network-based intrusion detection system using multi-objective genetic algorithm.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
U. Nandhini
,
S. V. N. Santhosh Kumar
A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things.
Int. J. Inf. Comput. Secur.
21 (3/4) (2023)
volume 20, number 3/4, 2023
Jagdish Chandra Pandey
,
Mala Kalra
An approach for secure data transmission in smart grids.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
A. Saravanan
,
S. Sathya Bama
CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
Djalila Belkebir
DIP-QGA: a secure and robust watermarking technique based on direct image projection and quantum genetic algorithm.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
Veer Sain Dixit
,
Akanksha Bansal Chopra
Push and nuke attacks detection using DNN-HHO algorithm.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
Shalini Subramani
,
M. Selvi
Intrusion detection system using RBPSO and fuzzy neuro-genetic classification algorithms in wireless sensor networks.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
Nayana Hegde
,
Sunilkumar S. Manvi
Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
K. Suresh
,
Rajarshi Pal
,
S. R. Balasundaram
A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
Vikas Tiwari
,
Ajeet Singh
,
Appala Naidu Tentu
,
Ashutosh Saxena
Generation of 8 × 8 S-boxes using 4 × 4 optimal S-boxes.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
Shalini Subramani
,
M. Selvi
Comprehensive review on distributed denial of service attacks in wireless sensor networks.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)
Bikash Baruah
,
Manash Pratim Dutta
,
Dhruba K. Bhattacharyya
An effective ensemble method for missing data imputation.
Int. J. Inf. Comput. Secur.
20 (3/4) (2023)