Sign in
EURASIP J. Inf. Secur.
2007
2013
2018
2024
2007
2024
Keyphrases
Publications
volume 2024, number 1, 2024
Kongze Li
Improved RFID mutual authentication protocol against exhaustive attack in the context of big data.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Jialu Lv
Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.
EURASIP J. Inf. Secur.
2024 (1) (2024)
Zhiqiang Chen
,
Zhihua Song
,
Tao Zhang
,
Yong Wei
IoT devices and data availability optimization by ANN and KNN.
EURASIP J. Inf. Secur.
2024 (1) (2024)
volume 2023, number 1, 2023
Balaji Rao Katika
,
Kannan Karthik
Image life trails based on contrast reduction models for face counter-spoofing.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Feifei Hu
,
Situo Zhang
,
Xubin Lin
,
Liu Wu
,
Niandong Liao
,
Yanqi Song
Network traffic classification model based on attention mechanism and spatiotemporal features.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Jimin Zhang
,
Xianfeng Zhao
,
Xiaolei He
Robust JPEG steganography based on the robustness classifier.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Olga Taran
,
Joakim Tutt
,
Taras Holotyak
,
Roman Chaban
,
Slavi Bonev
,
Slava Voloshynovskiy
Mobile authentication of copy detection patterns.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Jen-Ho Yang
A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Arslan Ali
,
Andrea Migliorati
,
Tiziano Bianchi
,
Enrico Magli
Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Md. Ezazul Islam
,
Md. Rafiqul Islam
,
Madhu Chetty
,
Suryani Lim
,
Mehmood Chadhar
User authentication and access control to blockchain-based forensic log data.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Olga Taran
,
Joakim Tutt
,
Taras Holotyak
,
Roman Chaban
,
Slavi Bonev
,
Slava Voloshynovskiy
Correction: Mobile authentication of copy detection patterns.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Ming Li
Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Dan Wang
,
Qing Wu
,
Ming Hu
Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Shaojun Chen
The design of network security protection trust management system based on an improved hidden Markov model.
EURASIP J. Inf. Secur.
2023 (1) (2023)
Xiaoning Wang
,
Jia Liu
,
Chunjiong Zhang
Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM.
EURASIP J. Inf. Secur.
2023 (1) (2023)
volume 2022, number 1, 2022
Pingan Fan
,
Hong Zhang
,
Xianfeng Zhao
Robust video steganography for social media sharing based on principal component analysis.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Francesco Picetti
,
Sara Mandelli
,
Paolo Bestagini
,
Vincenzo Lipari
,
Stefano Tubaro
DIPPAS: a deep image prior PRNU anonymization scheme.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Ayoub Lahmidi
,
Chouaib Moujahdi
,
Khalid Minaoui
,
Mohammed Rziza
On the methodology of fingerprint template protection schemes conception : meditations on the reliability.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Dmytro Progonov
,
Valentyna Cherniakova
,
Pavel V. Kolesnichenko
,
Andriy Oliynyk
Behavior-based user authentication on mobile devices in various usage contexts.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Binh Le Thanh Thai
,
Hidema Tanaka
,
Kohtaro Watanabe
Improved scheme and evaluation method for progressive visual cryptography.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Jing Lin
,
Laurent L. Njilla
,
Kaiqi Xiong
Secure machine learning against adversarial samples at test time.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Nghia Dinh
,
Lidia Ogiela
Human-artificial intelligence approaches for secure analysis in CAPTCHA codes.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Erwin Haasnoot
,
Luuk J. Spreeuwers
,
Raymond N. J. Veldhuis
Presentation attack detection and biometric recognition in a challenge-response formalism.
EURASIP J. Inf. Secur.
2022 (1) (2022)
Filipo Sharevski
,
Peter Jachim
"Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant.
EURASIP J. Inf. Secur.
2022 (1) (2022)
volume 2021, number 1, 2021
Cecilia Pasquini
,
Irene Amerini
,
Giulia Boato
Media forensics on social media platforms: a survey.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Christian Kraetzer
,
Andrey Makrushin
,
Jana Dittmann
,
Mario Hildebrandt
Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Benedetta Tondi
,
Andrea Costanzo
,
Dequ Huang
,
Bin Li
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Stefano Calzavara
,
Claudio Lucchese
,
Federico Marcuzzi
,
Salvatore Orlando
Feature partitioning for robust tree ensembles and their certification in adversarial scenarios.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Chengqiong Ye
,
Wenyu Shi
,
Rui Zhang
Research on gray correlation analysis and situation prediction of network information security.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Clara Borrelli
,
Paolo Bestagini
,
Fabio Antonacci
,
Augusto Sarti
,
Stefano Tubaro
Synthetic speech detection through short-term and long-term prediction traces.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Samuel Fernández-Menduiña
,
Fernando Pérez-González
On the information leakage quantification of camera fingerprint estimates.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Roland Schmitz
Use of SHDM in commutative watermarking encryption.
EURASIP J. Inf. Secur.
2021 (1) (2021)
T. Rama Reddy
,
P. V. G. D. Prasad Reddy
,
Rayudu Srinivas
,
Ch. V. Raghavendran
,
R. V. S. Lalitha
,
B. Annapurna
Proposing a reliable method of securing and verifying the credentials of graduates through blockchain.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Michele Russo
,
Nedim Srndic
,
Pavel Laskov
Detection of illicit cryptomining using network metadata.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Sebastiano Battiato
,
Oliver Giudice
,
Francesco Guarnera
,
Giovanni Puglisi
Estimating Previous Quantization Factors on Multiple JPEG Compressed Images.
EURASIP J. Inf. Secur.
2021 (1) (2021)
Pavlo Haleta
,
Dmytro Likhomanov
,
Oleksandra Sokol
Multitask adversarial attack with dispersion amplification.
EURASIP J. Inf. Secur.
2021 (1) (2021)
volume 2020, 2020
Kamalanathan Kandasamy
,
Sethuraman Srinivas
,
Krishnashree Achuthan
,
P. Venkat Rangan
IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process.
EURASIP J. Inf. Secur.
2020 (2020)
Carrie Wright
,
Darryl Stewart
Understanding visual lip-based biometric authentication for mobile devices.
EURASIP J. Inf. Secur.
2020 (2020)
Xinyi Ding
,
Zohreh Raziei
,
Eric C. Larson
,
Eli V. Olinick
,
Paul Krueger
,
Michael Hahsler
Swapped face detection using deep learning and subjective assessment.
EURASIP J. Inf. Secur.
2020 (2020)
Hanwei Zhang
,
Yannis Avrithis
,
Teddy Furon
,
Laurent Amsaleg
Smooth adversarial examples.
EURASIP J. Inf. Secur.
2020 (2020)
Keming Dong
,
Hyoung Joong Kim
,
Xiaohan Yu
,
Xiaoqing Feng
Reversible data hiding for binary images based on adaptive overlapping pattern.
EURASIP J. Inf. Secur.
2020 (2020)
Davide Cozzolino
,
Francesco Marra
,
Diego Gragnaniello
,
Giovanni Poggi
,
Luisa Verdoliva
Combining PRNU and noiseprint for robust and efficient device source identification.
EURASIP J. Inf. Secur.
2020 (2020)
Philipp Muth
,
Matthias Geihs
,
Tolga Arul
,
Johannes Buchmann
,
Stefan Katzenbeisser
.
EURASIP J. Inf. Secur.
2020 (2020)
Angelo Sotgiu
,
Ambra Demontis
,
Marco Melis
,
Battista Biggio
,
Giorgio Fumera
,
Xiaoyi Feng
,
Fabio Roli
Deep neural rejection against adversarial examples.
EURASIP J. Inf. Secur.
2020 (2020)
Junfeng Tian
,
Zilong Wang
,
Zhen Li
Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks.
EURASIP J. Inf. Secur.
2020 (2020)
Cecilia Pasquini
,
Rainer Böhme
Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition.
EURASIP J. Inf. Secur.
2020 (2020)
Oluwakemi Christiana Abikoye
,
Abdullahi Abubakar
,
Ahmad Dokoro Haruna
,
Noah Oluwatobi Akande
,
Anthonia Aderonke Kayode
A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm.
EURASIP J. Inf. Secur.
2020 (2020)
Elakkiya Ellavarason
,
Richard M. Guest
,
Farzin Deravi
Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device.
EURASIP J. Inf. Secur.
2020 (2020)
Olga Taran
,
Shideh Rezaeifar
,
Taras Holotyak
,
Slava Voloshynovskiy
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
EURASIP J. Inf. Secur.
2020 (2020)
Davood Noori
,
Hassan Shakeri
,
Masood Niazi Torshiz
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment.
EURASIP J. Inf. Secur.
2020 (2020)