Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ejisec/ejisec2024.bht:"
@article{DBLP:journals/ejisec/AliMBM24, author = {Arslan Ali and Andrea Migliorati and Tiziano Bianchi and Enrico Magli}, title = {Cancelable templates for secure face verification based on deep learning and random projections}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {7}, year = {2024}, url = {https://doi.org/10.1186/s13635-023-00147-y}, doi = {10.1186/S13635-023-00147-Y}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AliMBM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Chen24, author = {Shaojun Chen}, title = {Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {18}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00167-2}, doi = {10.1186/S13635-024-00167-2}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Chen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChenSZW24a, author = {Zhiqiang Chen and Zhihua Song and Tao Zhang and Yong Wei}, title = {Retraction Note: IoT devices and data availability optimization by {ANN} and {KNN}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {12}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00160-9}, doi = {10.1186/S13635-024-00160-9}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChenSZW24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lan24a, author = {Zhu Lan}, title = {Retraction Note: Network security threat detection technology based on {EPSO-BP} algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {11}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00161-8}, doi = {10.1186/S13635-024-00161-8}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lan24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Li24a, author = {Ming Li}, title = {Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on {BN} and {WSN}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {14}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00166-3}, doi = {10.1186/S13635-024-00166-3}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Li24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Li24b, author = {Kongze Li}, title = {Retraction Note: Improved {RFID} mutual authentication protocol against exhaustive attack in the context of big data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {16}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00163-6}, doi = {10.1186/S13635-024-00163-6}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Li24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lv24a, author = {Jialu Lv}, title = {Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {15}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00165-4}, doi = {10.1186/S13635-024-00165-4}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lv24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NivaashiniESPB24, author = {Mathappan Nivaashini and Suganya Elavarasan and Sountharrajan Sehar and M. Prabu and Durga Prasad Bavirisetti}, title = {{FEDDBN-IDS:} federated deep belief network-based wireless network intrusion detection system}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {8}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00156-5}, doi = {10.1186/S13635-024-00156-5}, timestamp = {Sun, 26 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NivaashiniESPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ParachaAFI24, author = {Anum Paracha and Junaid Arshad and Mohamed Ben Farah and Khalid Ismail}, title = {Machine learning security and privacy: a review of threats and countermeasures}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {10}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00158-3}, doi = {10.1186/S13635-024-00158-3}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ParachaAFI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SaleemWBORH24, author = {Kiran Saleem and Lei Wang and Salil Bharany and Khmaies Ouahada and Ateeq Ur Rehman and Habib Hamam}, title = {Intelligent multi-agent model for energy-efficient communication in wireless sensor networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {9}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00155-6}, doi = {10.1186/S13635-024-00155-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SaleemWBORH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangWH24, author = {Dan Wang and Qing Wu and Ming Hu}, title = {Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {17}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00168-1}, doi = {10.1186/S13635-024-00168-1}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Wu24a, author = {Shengqi Wu}, title = {Retraction Note: {RFID} tag recognition model for Internet of Things for training room management}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {19}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00164-5}, doi = {10.1186/S13635-024-00164-5}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Wu24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Yang24a, author = {Lin Yang}, title = {Retraction Note: Efficient identity security authentication method based on improved {R-LWE} algorithm in IoT environment}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {13}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00162-7}, doi = {10.1186/S13635-024-00162-7}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Yang24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChenSZW24, title = {IoT devices and data availability optimization by {ANN} and {KNN}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {2}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00145-0}, doi = {10.1186/S13635-023-00145-0}, timestamp = {Sat, 11 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChenSZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lan24, title = {Network security threat detection technology based on {EPSO-BP} algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {6}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00152-9}, doi = {10.1186/S13635-024-00152-9}, timestamp = {Sat, 11 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Li24, title = {Improved {RFID} mutual authentication protocol against exhaustive attack in the context of big data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {3}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00151-w}, doi = {10.1186/S13635-024-00151-W}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Li24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lv24, title = {Research on privacy and secure storage protection of personalized medical data based on hybrid encryption}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {1}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00150-3}, doi = {10.1186/S13635-023-00150-3}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lv24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Wu24, title = {{RFID} tag recognition model for Internet of Things for training room management}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {5}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00154-7}, doi = {10.1186/S13635-024-00154-7}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Wu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Yang24, title = {Efficient identity security authentication method based on improved {R-LWE} algorithm in IoT environment}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {4}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00153-8}, doi = {10.1186/S13635-024-00153-8}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Yang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.