Login / Signup
J. Inf. Secur. Appl.
2013
2017
2019
2024
2013
2024
Keyphrases
Publications
volume 85, 2024
ChuanPeng Guo
,
Wei Yang
,
Liusheng Huang
Semi-supervised QIM steganalysis with ladder networks.
J. Inf. Secur. Appl.
85 (2024)
JingYu Feng
,
Jing Zhang
,
Wenbo Zhang
,
Gang Han
Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet.
J. Inf. Secur. Appl.
85 (2024)
Tarek Gaber
,
Mathew Nicho
,
Esraa Ahmed
,
Ahmed Hamed
Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer.
J. Inf. Secur. Appl.
85 (2024)
Dewang Wang
,
Gaobo Yang
,
Zhiqing Guo
,
Jiyou Chen
Improving image steganography security via ensemble steganalysis and adversarial perturbation minimization.
J. Inf. Secur. Appl.
85 (2024)
Lívia Maria Bettini de Miranda
,
Rodrigo Dutra Garcia
,
Gowri Sankar Ramachandran
,
Jo Ueyama
,
Fábio Müller Guerrini
Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making.
J. Inf. Secur. Appl.
85 (2024)
Kanneboina Ashok
,
S. Gopikrishnan
A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment.
J. Inf. Secur. Appl.
85 (2024)
Qianrong Zheng
,
Jianwen Xiang
,
Rui Hao
,
Xuemin Zhang
,
Songsong Liao
,
Dongdong Zhao
A cancellable iris template protection scheme based on inverse merger and Bloom filter.
J. Inf. Secur. Appl.
85 (2024)
Omair Faraj
,
David Megías
,
Joaquín García
ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks.
J. Inf. Secur. Appl.
85 (2024)
Avinash Kumar Chaurasia
,
Matin Fallahi
,
Thorsten Strufe
,
Philipp Terhörst
,
Patricia Arias Cabarcos
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research.
J. Inf. Secur. Appl.
85 (2024)
volume 84, 2024
Guoqiang Deng
,
Yongzhuang Wei
,
Xuefeng Duan
,
Enes Pasalic
,
Samir Hodzic
Specifying cycles of minimal length for commonly used linear layers in block ciphers.
J. Inf. Secur. Appl.
84 (2024)
Amit Kumar Roy
,
Varadarajan Vijayakumar
,
Keshab Nath
Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks.
J. Inf. Secur. Appl.
84 (2024)
Vivek Dabra
,
Saru Kumari
,
Anju Bala
,
Sonam Yadav
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world.
J. Inf. Secur. Appl.
84 (2024)
Jacques Bou Abdo
,
Sherali Zeadally
Disposable identities: Solving web tracking.
J. Inf. Secur. Appl.
84 (2024)
Saurabh Agarwal
,
Ki-Hyun Jung
Digital image steganalysis using entropy driven deep neural network.
J. Inf. Secur. Appl.
84 (2024)
Shuangcheng Li
,
Zhangguo Tang
,
Huanzhou Li
,
Jian Zhang
,
Han Wang
,
Junfeng Wang
GMADV: An android malware variant generation and classification adversarial training framework.
J. Inf. Secur. Appl.
84 (2024)
Gao Wang
,
Gaoli Wang
Keeping classical distinguisher and neural distinguisher in balance.
J. Inf. Secur. Appl.
84 (2024)
Shuanggen Liu
,
Yingzi Hu
,
Xu An Wang
,
Xukai Liu
,
Yuqing Yin
,
Teng Wang
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.
J. Inf. Secur. Appl.
84 (2024)
Aikaterini Kanta
,
Iwen Coisel
,
Mark Scanlon
A comprehensive evaluation on the benefits of context based password cracking for digital forensics.
J. Inf. Secur. Appl.
84 (2024)
Jong-Yeon Park
,
Jang-Won Ju
,
Wonil Lee
,
Bo-Gyeong Kang
,
Yasuyuki Kachi
,
Kouichi Sakurai
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks.
J. Inf. Secur. Appl.
84 (2024)
Chao Ma
,
Haiying Gao
,
Bin Hu
Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices.
J. Inf. Secur. Appl.
84 (2024)
Sharad Joshi
,
Suraj Saxena
,
Nitin Khanna
Source printer identification from document images acquired using smartphone.
J. Inf. Secur. Appl.
84 (2024)
Zongye Zhang
,
Fucai Zhou
,
Ruiwei Hou
Privacy-preserving geo-tagged image search in edge-cloud computing for IoT.
J. Inf. Secur. Appl.
84 (2024)
Yaser Baseri
,
Abdelhakim Hafid
,
Mahdi Daghmehchi Firoozjaei
,
Soumaya Cherkaoui
,
Indrakshi Ray
Statistical privacy protection for secure data access control in cloud.
J. Inf. Secur. Appl.
84 (2024)
Girraj Kumar Verma
,
Nahida Majeed Wani
,
Saurabh Rana
,
Neeraj Kumar
,
Asheesh Tiwari
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles.
J. Inf. Secur. Appl.
84 (2024)
David Garcia Rosado
,
Luis Enrique Sánchez
,
Ángel Jesús Varela-Vaca
,
Antonio Santos-Olmo
,
María Teresa Gómez-López
,
Rafael M. Gasca
,
Eduardo Fernández-Medina
Enabling security risk assessment and management for business process models.
J. Inf. Secur. Appl.
84 (2024)
Xiangling Ding
,
Yingqian Deng
,
Yulin Zhao
,
Wenyi Zhu
AFTLNet: An efficient adaptive forgery traces learning network for deep image inpainting localization.
J. Inf. Secur. Appl.
84 (2024)
Yaolin Yang
,
Fan Chen
,
Heng-Ming Tai
,
Hongjie He
,
Lingfeng Qu
Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding.
J. Inf. Secur. Appl.
84 (2024)
Shaoqian Wu
,
Wei Wang
,
Zhanmeng Ding
Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection.
J. Inf. Secur. Appl.
84 (2024)
Lieyu Lv
,
Ling Xiong
,
Fagen Li
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption.
J. Inf. Secur. Appl.
84 (2024)
Yuming Liu
,
Yong Wang
,
Hao Feng
A novel link fabrication attack detection method for low-latency SDN networks.
J. Inf. Secur. Appl.
84 (2024)
volume 83, 2024
Poopak Alaeifar
,
Shantanu Pal
,
Zahra Jadidi
,
Mukhtar Hussain
,
Ernest Foo
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey.
J. Inf. Secur. Appl.
83 (2024)
Boli Hu
,
Kai Zhang
,
Junqing Gong
,
Lifei Wei
,
Jianting Ning
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
J. Inf. Secur. Appl.
83 (2024)
Rong Wang
,
Junchuan Liang
,
Siyu Wang
,
Chin-Chen Chang
A divide-and-conquer approach to privacy-preserving high-dimensional big data release.
J. Inf. Secur. Appl.
83 (2024)
Saher Tegane
,
Khaled Hamouid
,
Mawloud Omar
,
Fouzi Semchedine
,
Abdelmalek Boudries
Corrigendum to "An extended Attribute-based access control with controlled delegation in IoT" [Journal of Information Systems and Applications 76 (2023) 103473].
J. Inf. Secur. Appl.
83 (2024)
Yaolin Yang
,
Hongjie He
,
Fan Chen
,
Yuan Yuan
,
Ningxiong Mao
Secure Reversible Data Hiding in Encrypted Image Based on 2D Labeling and Block Classification Coding.
J. Inf. Secur. Appl.
83 (2024)
Hong-Bin Chen
,
Hsiang-Chun Hsu
,
Cang-Wei Huang
,
Justie Su-Tzu Juan
An easy-to-implement construction for (k,n)-threshold progressive visual secret sharing schemes.
J. Inf. Secur. Appl.
83 (2024)
Mohammadreza Shahlaei
,
Seyyed Mohsen Hashemi
A risk-aware and recommender distributed intrusion detection system for home robots.
J. Inf. Secur. Appl.
83 (2024)
Rui Chen
,
Yongcong Mou
,
Wei Li
A provably secure multi-server authentication scheme based on Chebyshev chaotic map.
J. Inf. Secur. Appl.
83 (2024)
Chenkai Zeng
,
Debiao He
,
Qi Feng
,
Cong Peng
,
Min Luo
The implementation of polynomial multiplication for lattice-based cryptography: A survey.
J. Inf. Secur. Appl.
83 (2024)
Chit-Jie Chew
,
Yu-Cheng Lin
,
Ying-Chin Chen
,
Yun-Yi Fan
,
Jung-San Lee
Preserving manipulated and synthetic Deepfake detection through face texture naturalness.
J. Inf. Secur. Appl.
83 (2024)
Zhichao Xu
,
Hong Xu
,
Lin Tan
,
Wen-Feng Qi
Linear cryptanalysis of SPECK and SPARX.
J. Inf. Secur. Appl.
83 (2024)
Nabeil Eltayieb
,
Rashad Elhabob
,
Yongjian Liao
,
Fagen Li
,
Shijie Zhou
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.
J. Inf. Secur. Appl.
83 (2024)
Xinyan Wu
,
Jin Li
,
Huanwei Wang
,
Xiaoguang Liu
,
Weifeng Wu
,
Fagen Li
A randomized encryption deduplication method against frequency attack.
J. Inf. Secur. Appl.
83 (2024)
Gautam Kumar
,
Sambit Bakshi
,
Muhammad Attique Khan
,
Hussain Mobarak Albarakati
Unraveling effects of ocular features on the performance of periocular biometrics.
J. Inf. Secur. Appl.
83 (2024)
Mashael M. Khayyat
,
Nuha Zamzami
,
Li Zhang
,
Michele Nappi
,
Muhammad Umer
Fuzzy-CNN: Improving personal human identification based on IRIS recognition using LBP features.
J. Inf. Secur. Appl.
83 (2024)
Giampaolo Bovenzi
,
Davide Di Monda
,
Antonio Montieri
,
Valerio Persico
,
Antonio Pescapè
Classifying attack traffic in IoT environments via few-shot learning.
J. Inf. Secur. Appl.
83 (2024)
Hong Zhao
,
Enting Guo
,
Zhuotao Lian
,
Yong Zhao
,
Xinyi Huang
,
Chunhua Su
A review and implementation of physical layer channel key generation in the Internet of Things.
J. Inf. Secur. Appl.
83 (2024)
Yongqing Huang
,
Jin Gou
,
Zongwen Fan
,
Yongxin Liao
,
Yanmin Zhuang
A multi-label network attack detection approach based on two-stage model fusion.
J. Inf. Secur. Appl.
83 (2024)
Dolendro Singh Laiphrakpam
,
Akash Lahoty
,
Chanubala Devi
,
Deepjoy Dey
,
Punyabrat Saikai
,
Khumukcham Sonam Devi
,
Motilal Singh Khoirom
Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system.
J. Inf. Secur. Appl.
83 (2024)
Le Sun
,
Yiwen Hua
,
Ghulam Muhammad
Biometric identity recognition based on contrastive positive-unlabeled learning.
J. Inf. Secur. Appl.
83 (2024)