![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 50
Volume 50, February 2020
- Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman:
A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment. - Min Yang, Shibin Zhang, Hang Zhang, Jinyue Xia:
Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371. - Fucai Zhou, Qiang Wang, Jian Xu
, Su Peng, Zifeng Xu:
Chameleon accumulator and its applications. - Ryma Boussaha, Yacine Challal
, Abdelmadjid Bouabdallah, Malika Bessedik:
Optimized in-network authentication against pollution attacks in software-defined-named data networking. - Sudeep Tanwar
, Karan Parekh, Richard Evans:
Blockchain-based electronic healthcare record system for healthcare 4.0 applications. - Shravani Mahesh Patil, B. R. Purushothama:
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks. - Suhad Muhajer Kareem, Abdul Monem S. Rahma:
A novel approach for the development of the Twofish algorithm based on multi-level key space. - Partha Chowdhuri
, Biswapati Jana
:
Hiding data in dual color images reversibly via weighted matrix. - Je Sen Teh
, Moatsum Alawida
, You Cheng Sii:
Implementation and practical problems of chaos-based cryptography revisited. - Mohamed Amine Ferrag
, Leandros Maglaras
, Sotiris Moschoyiannis
, Helge Janicke:
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. - Mamoru Mimura
:
Adjusting lexical features of actual proxy logs for intrusion detection. - Hidangmayum Saxena Devi, Khumanthem Manglem Singh
:
Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection. - Andrea De Lorenzo
, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Antonella Santone:
Visualizing the outcome of dynamic analysis of Android malware with VizMal. - Surmila Thokchom, Dilip Kr. Saikia:
Privacy preserving integrity checking of shared dynamic cloud data with user revocation. - K. C. Jithin, Syam Sankar
:
Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set. - Mimi Ma, Debiao He, Shuqin Fan, Dengguo Feng:
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.