- Saad Khan, Simon Parkinson:
Discovering and utilising expert knowledge from security event logs.
- Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions.
- Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Checking certificate revocation efficiently using certificate revocation guard.
- Kassim S. Mwitondi, Raed A. Said, Shahrzad Zargari:
A robust domain partitioning intrusion detection method.
- Chengqing Li, Yun Zhang, Eric Yong Xie:
When an attacker meets a cipher-image in 2018: A year in review.
- Wenbo Yang, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Security analysis of third-party in-app payment in mobile applications.
- Md. Rafiul Biswas, Kazi Md. Rokibul Alam, Shinsuke Tamura, Yasuhiko Morimoto:
A technique for DNA cryptography based on dynamic mechanisms.
- Shamsher Ullah, Xiang-Yang Li, Muhammad Tanveer Hussain, Zhang Lan:
Kernel homomorphic encryption protocol.
- Rajesh Kumar Shrivastava, Chittaranjan Hota:
Profile-guided code identification and hardening using return oriented programming.
- M. Masoumi:
A highly efficient and secure hardware implementation of the advanced encryption standard.
- Peter McLaren, William J. Buchanan, Gordon Russell, Zhiyuan Tan:
Deriving ChaCha20 key streams from targeted memory analysis.
- Riccardo Focardi, Flaminia L. Luccio, Heider A. M. Wahsheh:
Usable security for QR code.
- A. H. M. Kamal, Mohammad Mahfuzul Islam:
A prediction error based histogram association and mapping technique for data embedment.
- Tanupreet Sabharwal, Rashmi Gupta:
Human identification after plastic surgery using region based score level fusion of local facial features.
- Matthew Nunes, Pete Burnap, Omer Rana, Philipp Reinecke, Kaelon Lloyd:
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis.
- Azadeh Mansouri, Ahmad Mahmoudi Aznaveh:
Toward a secure video watermarking in compressed domain.
- Roberto Andrade, Sang Guun Yoo:
Cognitive security: A comprehensive study of cognitive science in cybersecurity.
- Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang, Wasif Afzal, Awaid Yasin:
Sharing information online rationally: An observation of user privacy concerns and awareness using serious game.
- Dileep Kumar Singh, Praveen Kaushik:
Intrusion response prioritization based on fuzzy ELECTRE multiple criteria decision making technique.
- Mohamed Alloghani, Mohammed M. Alani, Dhiya Al-Jumeily, Thar Baker, Jamila Mustafina, Abir Hussain, Ahmed J. Aljaaf:
A systematic review on the status and progress of homomorphic encryption technologies.
- Hongyong Jia, Yue Chen, Yan Li, Xincheng Yan, Fenlin Liu, Xiangyang Luo, Bo Wang:
Attributes revocation through ciphertext puncturation.
- Wunan Wan, Jun Chen, Shibing Zhang, Jinyue Xia:
A Cluster Correlation power analysis against double blinding exponentiation.
- Leqi Jiang, Yi Cao, Chengsheng Yuan, Xingming Sun, Xiaoli Zhu:
An effective comparison protocol over encrypted data in cloud computing.
- Asad Malik, Hongxia Wang, Tailong Chen, Tianlong Yang, Ahmad Neyaz Khan, Hanzhou Wu, Yanli Chen, Yi Hu:
Reversible data hiding in homomorphically encrypted image using interpolation technique.
- Yifan Tian, Jiawei Yuan, Houbing Song:
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.