default search action
Journal of Information Security and Applications, Volume 50
Volume 50, February 2020
- Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman:
A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment. - Min Yang, Shibin Zhang, Hang Zhang, Jinyue Xia:
Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371. - Fucai Zhou, Qiang Wang, Jian Xu, Su Peng, Zifeng Xu:
Chameleon accumulator and its applications. - Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah, Malika Bessedik:
Optimized in-network authentication against pollution attacks in software-defined-named data networking. - Sudeep Tanwar, Karan Parekh, Richard Evans:
Blockchain-based electronic healthcare record system for healthcare 4.0 applications. - Shravani Mahesh Patil, B. R. Purushothama:
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks. - Suhad Muhajer Kareem, Abdul Monem S. Rahma:
A novel approach for the development of the Twofish algorithm based on multi-level key space. - Partha Chowdhuri, Biswapati Jana:
Hiding data in dual color images reversibly via weighted matrix. - Je Sen Teh, Moatsum Alawida, You Cheng Sii:
Implementation and practical problems of chaos-based cryptography revisited. - Mohamed Amine Ferrag, Leandros Maglaras, Sotiris Moschoyiannis, Helge Janicke:
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. - Mamoru Mimura:
Adjusting lexical features of actual proxy logs for intrusion detection. - Hidangmayum Saxena Devi, Khumanthem Manglem Singh:
Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection. - Andrea De Lorenzo, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Antonella Santone:
Visualizing the outcome of dynamic analysis of Android malware with VizMal. - Surmila Thokchom, Dilip Kr. Saikia:
Privacy preserving integrity checking of shared dynamic cloud data with user revocation. - K. C. Jithin, Syam Sankar:
Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set. - Mimi Ma, Debiao He, Shuqin Fan, Dengguo Feng:
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.