Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Information Security and Applications, Volume 46
Volume 46, June 2019
- Ankur Lohachab, Bidhan Karambir:
ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. 1-12
- Salvatore Carta, Gianni Fenu, Diego Reforgiato Recupero, Roberto Saia:
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model. 13-22 - K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
An efficient colour image encryption scheme based on 1-D chaotic maps. 23-41 - Defu Wang, Xiaojuan Wang, Yong Zhang, Lei Jin:
Detection of power grid disturbances and cyber-attacks based on machine learning. 42-52 - Rami Mustafa A. Mohammad, Mohammed Abdulrahman Alqahtani:
A comparison of machine learning techniques for file system forensics analysis. 53-61 - Diego Renza, Sebastián Mendoza, Dora M. Ballesteros L.:
High-uncertainty audio signal encryption based on the Collatz conjecture. 62-69 - Subodh Kumar, Rajendra Kumar, Sushil Kumar, Sunil Kumar:
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security. 70-83 - Jalesh Kumar, Shivananda Nirmala:
Securing the regions comprising information in a document image with novel key selection technique - a parallel approach. 84-95 - Hiep Cong Pham, Linda Brennan, Steven Furnell:
Information security burnout: Identification of sources and mitigating factors from security demands and resources. 96-107
- Tapasi Bhattacharjee, Santi P. Maity:
Progressive and hierarchical share-in-share scheme over cloud. 108-120 - Rui Ferreira, Rui L. Aguiar:
Repositioning privacy concerns: Web servers controlling URL metadata. 121-137
- Dimitrios Damopoulos, Georgios Kambourakis:
Hands-Free one-Time and continuous authentication using glass wearable devices. 138-150 - Kyrylo Petrenko, Atefeh Mashatan, Farid Shirazi:
Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization. 151-163 - Umesh Kumar Singh, Chanchala Joshi, Dimitris Kanellopoulos:
A framework for zero-day vulnerabilities detection and prioritization. 164-172 - Neelam Dabas, Ram Pal Singh:
ELM-Kernel and reduced kernel ELM based watermarking scheme. 173-192 - Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti:
Misbehavior detection and efficient revocation within VANET. 193-209 - Abdelrahman Altigani, Shafaatunnur Hasan, Siti Mariyam Shamsuddin, Bazara I. A. Barry:
A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite. 210-221 - Mordechai Guri:
Optical air-gap exfiltration attack via invisible images. 222-230 - Rohit M. Thanki, Ashish Kothari, Deven Trivedi:
Hybrid and blind watermarking scheme in DCuT - RDWT domain. 231-249 - Shanshan Li, Chunxiang Xu, Yuan Zhang:
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage. 250-258
- Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang:
Dynamic privacy leakage analysis of Android third-party libraries. 259-270 - Guoming Wang, Rongxing Lu, Cheng Huang, Yong Liang Guan:
An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare. 271-280
- Arvind Bakshi, Anoop Kumar Patel:
Secure telemedicine using RONI halftoned visual cryptography without pixel expansion. 281-295 - Andrea Visconti, Ondrej Mosnácek, Milan Broz, Vashek Matyás:
Examining PBKDF2 security margin - Case study of LUKS. 296-306
- Ngoc-Dung T. Tieu, Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Spatio-temporal generative adversarial network for gait anonymization. 307-319 - Sudipta Kumar Ghosal, Jyotsna Kumar Mandal:
On the use of the Stirling Transform in image steganography. 320-330
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.