Login / Signup
EURASIP J. Inf. Secur.
2007
2013
2017
2024
2007
2024
Keyphrases
Publications
volume 2024, number 1, 2024
Retraction Note: IoT devices and data availability optimization by ANN and KNN.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Nezer Jacob Zaidenberg
,
Michael Kiperberg
HyperWallet: cryptocurrency wallet as a secure hypervisor-based application.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Kongze Li
Improved RFID mutual authentication protocol against exhaustive attack in the context of big data.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Matthew Comb
,
Andrew Martin
Mining digital identity insights: patent analysis using NLP.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Mohamed A. Taha
,
Mohamed K. M. Fadul
,
Joshua H. Tyler
,
Donald R. Reising
,
T. Daniel Loveless
Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based images.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Network security threat detection technology based on EPSO-BP algorithm.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Retraction Note: Network security threat detection technology based on EPSO-BP algorithm.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Jimin Zhang
,
Xiaolei He
,
Yun Cao
Errorless robust JPEG steganography using steganographic polar codes.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Zhiqiang Chen
,
Zhihua Song
,
Tao Zhang
,
Yong Wei
IoT devices and data availability optimization by ANN and KNN.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Arslan Ali
,
Andrea Migliorati
,
Tiziano Bianchi
,
Enrico Magli
Cancelable templates for secure face verification based on deep learning and random projections.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Arkan Hammoodi Hasan Kabla
,
Achmad Husni Thamrin
,
Mohammed Anbar
,
Selvakumar Manickam
,
Shankar Karuppayah
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Anum Paracha
,
Junaid Arshad
,
Mohamed Ben Farah
,
Khalid Ismail
Machine learning security and privacy: a review of threats and countermeasures.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Mathappan Nivaashini
,
Suganya Elavarasan
,
Sountharrajan Sehar
,
M. Prabu
,
Durga Prasad Bavirisetti
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Shuying Xu
,
Ching-Chun Chang
,
Huy H. Nguyen
,
Isao Echizen
Reversible anonymization for privacy of facial biometrics via cyclic learning.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Kiran Saleem
,
Lei Wang
,
Salil Bharany
,
Khmaies Ouahada
,
Ateeq Ur Rehman
,
Habib Hamam
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Retraction Note: RFID tag recognition model for Internet of Things for training room management.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Randy Kuang
,
Maria Perepechaenko
,
Ryan Toth
,
Michel Barbeau
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm.
EURASIP J. Inf. Secur.
2024 (1) (2024)
RFID tag recognition model for Internet of Things for training room management.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Jialu Lv
Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.
EURASIP J. Inf. Secur.
2024 (1) (2024)
volume 2023, number 1, 2023
Dan Wang
,
Qing Wu
,
Ming Hu
Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Olga Taran
,
Joakim Tutt
,
Taras Holotyak
,
Roman Chaban
,
Slavi Bonev
,
Slava Voloshynovskiy
Correction: Mobile authentication of copy detection patterns.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Shaojun Chen
The design of network security protection trust management system based on an improved hidden Markov model.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Feifei Hu
,
Situo Zhang
,
Xubin Lin
,
Liu Wu
,
Niandong Liao
,
Yanqi Song
Network traffic classification model based on attention mechanism and spatiotemporal features.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Jimin Zhang
,
Xianfeng Zhao
,
Xiaolei He
Robust JPEG steganography based on the robustness classifier.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Md. Ezazul Islam
,
Md. Rafiqul Islam
,
Madhu Chetty
,
Suryani Lim
,
Mehmood Chadhar
User authentication and access control to blockchain-based forensic log data.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Xiaoning Wang
,
Jia Liu
,
Chunjiong Zhang
Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Jen-Ho Yang
A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Balaji Rao Katika
,
Kannan Karthik
Image life trails based on contrast reduction models for face counter-spoofing.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Arslan Ali
,
Andrea Migliorati
,
Tiziano Bianchi
,
Enrico Magli
Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Ming Li
Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Olga Taran
,
Joakim Tutt
,
Taras Holotyak
,
Roman Chaban
,
Slavi Bonev
,
Slava Voloshynovskiy
Mobile authentication of copy detection patterns.
EURASIP J. Inf. Secur.
2023 (1) (2023)
volume 2022, number 1, 2022
Pingan Fan
,
Hong Zhang
,
Xianfeng Zhao
Robust video steganography for social media sharing based on principal component analysis.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Francesco Picetti
,
Sara Mandelli
,
Paolo Bestagini
,
Vincenzo Lipari
,
Stefano Tubaro
DIPPAS: a deep image prior PRNU anonymization scheme.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Ayoub Lahmidi
,
Chouaib Moujahdi
,
Khalid Minaoui
,
Mohammed Rziza
On the methodology of fingerprint template protection schemes conception : meditations on the reliability.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Dmytro Progonov
,
Valentyna Cherniakova
,
Pavel V. Kolesnichenko
,
Andriy Oliynyk
Behavior-based user authentication on mobile devices in various usage contexts.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Jing Lin
,
Laurent L. Njilla
,
Kaiqi Xiong
Secure machine learning against adversarial samples at test time.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Binh Le Thanh Thai
,
Hidema Tanaka
,
Kohtaro Watanabe
Improved scheme and evaluation method for progressive visual cryptography.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Nghia Dinh
,
Lidia Ogiela
Human-artificial intelligence approaches for secure analysis in CAPTCHA codes.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Erwin Haasnoot
,
Luuk J. Spreeuwers
,
Raymond N. J. Veldhuis
Presentation attack detection and biometric recognition in a challenge-response formalism.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Filipo Sharevski
,
Peter Jachim
"Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant.
EURASIP J. Inf. Secur.
2022 (1) (2022)
volume 2021, number 1, 2021
Cecilia Pasquini
,
Irene Amerini
,
Giulia Boato
Media forensics on social media platforms: a survey.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Christian Kraetzer
,
Andrey Makrushin
,
Jana Dittmann
,
Mario Hildebrandt
Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Benedetta Tondi
,
Andrea Costanzo
,
Dequ Huang
,
Bin Li
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture.
EURASIP J. Inf. Secur.
2021 (1) (2021)