Search dblp for Publications

export results for "toc:db/journals/istr/istr53.bht:"

 download as .bib file

@article{DBLP:journals/istr/AskarinWP20,
  author       = {Mohammad Mogharen Askarin and
                  KokSheik Wong and
                  Rapha{\"{e}}l C.{-}W. Phan},
  title        = {Reduced contact lifting of latent fingerprints from curved surfaces},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102520},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102520},
  doi          = {10.1016/J.JISA.2020.102520},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AskarinWP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BanerjeeRODCRP20,
  author       = {Soumya Banerjee and
                  Sandip Roy and
                  Vanga Odelu and
                  Ashok Kumar Das and
                  Samiran Chattopadhyay and
                  Joel J. P. C. Rodrigues and
                  Youngho Park},
  title        = {Multi-Authority CP-ABE-Based user access control scheme with constant-size
                  key and ciphertext for IoT deployment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102503},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102503},
  doi          = {10.1016/J.JISA.2020.102503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BanerjeeRODCRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BaraniAVI20,
  author       = {Milad Jafari Barani and
                  Peyman Ayubi and
                  Milad Yousefi Valandar and
                  Behzad Yosefnezhad Irani},
  title        = {A new Pseudo random number generator based on generalized Newton complex
                  map with dynamic key},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102509},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102509},
  doi          = {10.1016/J.JISA.2020.102509},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BaraniAVI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenCN20,
  author       = {Longbin Chen and
                  Li{-}Chiou Chen and
                  Nader Nassar},
  title        = {Carp: {A} cost-aware relaxed protocol for encrypted data stores},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102501},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102501},
  doi          = {10.1016/J.JISA.2020.102501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenCN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FalmariB20,
  author       = {Vinod Ramesh Falmari and
                  M. Brindha},
  title        = {Privacy preserving cloud based secure digital locker using Paillier
                  based difference function and chaos based cryptosystem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102513},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102513},
  doi          = {10.1016/J.JISA.2020.102513},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FalmariB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoGC20,
  author       = {Hang Gao and
                  Tiegang Gao and
                  Renhong Cheng},
  title        = {Robust detection of median filtering based on data-pair histogram
                  feature and local configuration pattern},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102506},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102506},
  doi          = {10.1016/J.JISA.2020.102506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoWL20,
  author       = {Juntao Gao and
                  Tong Wu and
                  Xuelian Li},
  title        = {Secure, fair and instant data trading scheme based on bitcoin},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102511},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102511},
  doi          = {10.1016/J.JISA.2020.102511},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HathaliyaTE20,
  author       = {Jigna J. Hathaliya and
                  Sudeep Tanwar and
                  Richard Evans},
  title        = {Securing electronic healthcare records: {A} mobile-based biometric
                  authentication approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102528},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102528},
  doi          = {10.1016/J.JISA.2020.102528},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HathaliyaTE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HouYZZH20,
  author       = {Hong{-}xia Hou and
                  Bo Yang and
                  Mingrui Zhang and
                  Yanwei Zhou and
                  Meijuan Huang},
  title        = {Fully secure wicked identity-based encryption resilient to continual
                  auxiliary- inputs leakage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102521},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102521},
  doi          = {10.1016/J.JISA.2020.102521},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HouYZZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhanM20,
  author       = {Haibat Khan and
                  Keith M. Martin},
  title        = {A survey of subscription privacy on the 5G radio interface - The past,
                  present and future},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102537},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102537},
  doi          = {10.1016/J.JISA.2020.102537},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhanM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KunduDMC20,
  author       = {Nibedita Kundu and
                  Sumit Kumar Debnath and
                  Dheerendra Mishra and
                  Tanmay Choudhury},
  title        = {Post-quantum digital signature scheme based on multivariate cubic
                  problem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102512},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102512},
  doi          = {10.1016/J.JISA.2020.102512},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KunduDMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KushwahR20,
  author       = {Gopal Singh Kushwah and
                  Virender Ranga},
  title        = {Voting extreme learning machine based distributed denial of service
                  attack detection in cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102532},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102532},
  doi          = {10.1016/J.JISA.2020.102532},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KushwahR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Li20,
  author       = {Hui Li},
  title        = {Pseudo-random scalar multiplication based on group isomorphism},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102534},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102534},
  doi          = {10.1016/J.JISA.2020.102534},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Li20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraA20,
  author       = {Zeesha Mishra and
                  Bibhudendra Acharya},
  title        = {High throughput and low area architectures of secure IoT algorithm
                  for medical image encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102533},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102533},
  doi          = {10.1016/J.JISA.2020.102533},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MishraA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/OkumuraOS20,
  author       = {Naomi Okumura and
                  Kazuhiro Ogata and
                  Yoichi Shinoda},
  title        = {Formal analysis of {RFC} 8120 authentication protocol for {HTTP} under
                  different assumptions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102529},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102529},
  doi          = {10.1016/J.JISA.2020.102529},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/OkumuraOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PakniatSE20,
  author       = {Nasrollah Pakniat and
                  Danial Shiraly and
                  Ziba Eslami},
  title        = {Certificateless authenticated encryption with keyword search: Enhanced
                  security model and a concrete construction for industrial IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102525},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102525},
  doi          = {10.1016/J.JISA.2020.102525},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PakniatSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QurashiAK20,
  author       = {Mohammed Al Qurashi and
                  Constantinos Marios Angelopoulos and
                  Vasilios Katos},
  title        = {An architecture for resilient intrusion detection in ad-hoc networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102530},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102530},
  doi          = {10.1016/J.JISA.2020.102530},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QurashiAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RomdhaneY20,
  author       = {Imene Romdhane and
                  Heba Yuksel},
  title        = {A low-complexity security technique in physical layer for fixed LiFi
                  communication systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102514},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102514},
  doi          = {10.1016/J.JISA.2020.102514},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RomdhaneY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SazdarGMKW20,
  author       = {Amir Mahdi Sazdar and
                  Seyed Ali Ghorashi and
                  Vahideh Moghtadaiee and
                  Ahmad Khonsari and
                  David Windridge},
  title        = {A Low-complexity trajectory privacy preservation approach for indoor
                  fingerprinting positioning systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102515},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102515},
  doi          = {10.1016/J.JISA.2020.102515},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SazdarGMKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SeiboldSHE20,
  author       = {Clemens Seibold and
                  Wojciech Samek and
                  Anna Hilsmann and
                  Peter Eisert},
  title        = {Accurate and robust neural networks for face morphing attack detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102526},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102526},
  doi          = {10.1016/J.JISA.2020.102526},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SeiboldSHE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SureshkumarAOK20,
  author       = {Venkatasamy Sureshkumar and
                  Ruhul Amin and
                  Mohammad S. Obaidat and
                  Isswarya Karthikeyan},
  title        = {An enhanced mutual authentication and key establishment protocol for
                  {TMIS} using chaotic map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102539},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102539},
  doi          = {10.1016/J.JISA.2020.102539},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SureshkumarAOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SusiloTY20,
  author       = {Willy Susilo and
                  Joseph Tonien and
                  Guomin Yang},
  title        = {A generalised bound for the Wiener attack on {RSA}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102531},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102531},
  doi          = {10.1016/J.JISA.2020.102531},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SusiloTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangWXWZ20,
  author       = {Chen Wang and
                  Andi Wang and
                  Jian Xu and
                  Qiang Wang and
                  Fucai Zhou},
  title        = {Outsourced privacy-preserving decision tree classification service
                  over encrypted data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102517},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102517},
  doi          = {10.1016/J.JISA.2020.102517},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangWXWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiongWSY20,
  author       = {Hu Xiong and
                  Yan Wu and
                  Chunhua Su and
                  Kuo{-}Hui Yeh},
  title        = {A secure and efficient certificateless batch verification scheme with
                  invalid signature identification for the internet of things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102507},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102507},
  doi          = {10.1016/J.JISA.2020.102507},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XiongWSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YadollahiENLC20,
  author       = {Mehdi Yadollahi and
                  Rasul Enayatifar and
                  Hossein Nematzadeh and
                  Malrey Lee and
                  Jae{-}Young Choi},
  title        = {A novel image security technique based on nucleic acid concepts},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102505},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102505},
  doi          = {10.1016/J.JISA.2020.102505},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YadollahiENLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics