Search dblp for Publications

export results for "toc:db/journals/ejisec/ejisec2024.bht:"

 download as .bib file

@article{DBLP:journals/ejisec/AliMBM24,
  author       = {Arslan Ali and
                  Andrea Migliorati and
                  Tiziano Bianchi and
                  Enrico Magli},
  title        = {Cancelable templates for secure face verification based on deep learning
                  and random projections},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {7},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-023-00147-y},
  doi          = {10.1186/S13635-023-00147-Y},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AliMBM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Chen24,
  author       = {Shaojun Chen},
  title        = {Retraction Note: The design of network security protection trust management
                  system based on an improved hidden Markov model},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {18},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00167-2},
  doi          = {10.1186/S13635-024-00167-2},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Chen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChenSZW24a,
  author       = {Zhiqiang Chen and
                  Zhihua Song and
                  Tao Zhang and
                  Yong Wei},
  title        = {Retraction Note: IoT devices and data availability optimization by
                  {ANN} and {KNN}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {12},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00160-9},
  doi          = {10.1186/S13635-024-00160-9},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChenSZW24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lan24a,
  author       = {Zhu Lan},
  title        = {Retraction Note: Network security threat detection technology based
                  on {EPSO-BP} algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {11},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00161-8},
  doi          = {10.1186/S13635-024-00161-8},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lan24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li24a,
  author       = {Ming Li},
  title        = {Retraction Note: Node fault diagnosis algorithm for wireless sensor
                  networks based on {BN} and {WSN}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {14},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00166-3},
  doi          = {10.1186/S13635-024-00166-3},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li24b,
  author       = {Kongze Li},
  title        = {Retraction Note: Improved {RFID} mutual authentication protocol against
                  exhaustive attack in the context of big data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {16},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00163-6},
  doi          = {10.1186/S13635-024-00163-6},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lv24a,
  author       = {Jialu Lv},
  title        = {Retraction Note: Research on privacy and secure storage protection
                  of personalized medical data based on hybrid encryption},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {15},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00165-4},
  doi          = {10.1186/S13635-024-00165-4},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lv24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NivaashiniESPB24,
  author       = {Mathappan Nivaashini and
                  Suganya Elavarasan and
                  Sountharrajan Sehar and
                  M. Prabu and
                  Durga Prasad Bavirisetti},
  title        = {{FEDDBN-IDS:} federated deep belief network-based wireless network
                  intrusion detection system},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {8},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00156-5},
  doi          = {10.1186/S13635-024-00156-5},
  timestamp    = {Sun, 26 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NivaashiniESPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ParachaAFI24,
  author       = {Anum Paracha and
                  Junaid Arshad and
                  Mohamed Ben Farah and
                  Khalid Ismail},
  title        = {Machine learning security and privacy: a review of threats and countermeasures},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {10},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00158-3},
  doi          = {10.1186/S13635-024-00158-3},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ParachaAFI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SaleemWBORH24,
  author       = {Kiran Saleem and
                  Lei Wang and
                  Salil Bharany and
                  Khmaies Ouahada and
                  Ateeq Ur Rehman and
                  Habib Hamam},
  title        = {Intelligent multi-agent model for energy-efficient communication in
                  wireless sensor networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {9},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00155-6},
  doi          = {10.1186/S13635-024-00155-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SaleemWBORH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangWH24,
  author       = {Dan Wang and
                  Qing Wu and
                  Ming Hu},
  title        = {Retraction Note: Hierarchical energy-saving routing algorithm using
                  fuzzy logic in wireless sensor networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {17},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00168-1},
  doi          = {10.1186/S13635-024-00168-1},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Wu24a,
  author       = {Shengqi Wu},
  title        = {Retraction Note: {RFID} tag recognition model for Internet of Things
                  for training room management},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {19},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00164-5},
  doi          = {10.1186/S13635-024-00164-5},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Wu24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Yang24a,
  author       = {Lin Yang},
  title        = {Retraction Note: Efficient identity security authentication method
                  based on improved {R-LWE} algorithm in IoT environment},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {13},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00162-7},
  doi          = {10.1186/S13635-024-00162-7},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Yang24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChenSZW24,
  title        = {IoT devices and data availability optimization by {ANN} and {KNN}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {2},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00145-0},
  doi          = {10.1186/S13635-023-00145-0},
  timestamp    = {Sat, 11 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChenSZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lan24,
  title        = {Network security threat detection technology based on {EPSO-BP} algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {6},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00152-9},
  doi          = {10.1186/S13635-024-00152-9},
  timestamp    = {Sat, 11 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li24,
  title        = {Improved {RFID} mutual authentication protocol against exhaustive
                  attack in the context of big data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {3},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00151-w},
  doi          = {10.1186/S13635-024-00151-W},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lv24,
  title        = {Research on privacy and secure storage protection of personalized
                  medical data based on hybrid encryption},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {1},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00150-3},
  doi          = {10.1186/S13635-023-00150-3},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lv24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Wu24,
  title        = {{RFID} tag recognition model for Internet of Things for training room
                  management},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {5},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00154-7},
  doi          = {10.1186/S13635-024-00154-7},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Wu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Yang24,
  title        = {Efficient identity security authentication method based on improved
                  {R-LWE} algorithm in IoT environment},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {4},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00153-8},
  doi          = {10.1186/S13635-024-00153-8},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Yang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics