Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr53.bht:"
@article{DBLP:journals/istr/AskarinWP20, author = {Mohammad Mogharen Askarin and KokSheik Wong and Rapha{\"{e}}l C.{-}W. Phan}, title = {Reduced contact lifting of latent fingerprints from curved surfaces}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102520}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102520}, doi = {10.1016/J.JISA.2020.102520}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AskarinWP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BanerjeeRODCRP20, author = {Soumya Banerjee and Sandip Roy and Vanga Odelu and Ashok Kumar Das and Samiran Chattopadhyay and Joel J. P. C. Rodrigues and Youngho Park}, title = {Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102503}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102503}, doi = {10.1016/J.JISA.2020.102503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BanerjeeRODCRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BaraniAVI20, author = {Milad Jafari Barani and Peyman Ayubi and Milad Yousefi Valandar and Behzad Yosefnezhad Irani}, title = {A new Pseudo random number generator based on generalized Newton complex map with dynamic key}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102509}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102509}, doi = {10.1016/J.JISA.2020.102509}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BaraniAVI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenCN20, author = {Longbin Chen and Li{-}Chiou Chen and Nader Nassar}, title = {Carp: {A} cost-aware relaxed protocol for encrypted data stores}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102501}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102501}, doi = {10.1016/J.JISA.2020.102501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FalmariB20, author = {Vinod Ramesh Falmari and M. Brindha}, title = {Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102513}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102513}, doi = {10.1016/J.JISA.2020.102513}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FalmariB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoGC20, author = {Hang Gao and Tiegang Gao and Renhong Cheng}, title = {Robust detection of median filtering based on data-pair histogram feature and local configuration pattern}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102506}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102506}, doi = {10.1016/J.JISA.2020.102506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoWL20, author = {Juntao Gao and Tong Wu and Xuelian Li}, title = {Secure, fair and instant data trading scheme based on bitcoin}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102511}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102511}, doi = {10.1016/J.JISA.2020.102511}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HathaliyaTE20, author = {Jigna J. Hathaliya and Sudeep Tanwar and Richard Evans}, title = {Securing electronic healthcare records: {A} mobile-based biometric authentication approach}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102528}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102528}, doi = {10.1016/J.JISA.2020.102528}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HathaliyaTE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HouYZZH20, author = {Hong{-}xia Hou and Bo Yang and Mingrui Zhang and Yanwei Zhou and Meijuan Huang}, title = {Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102521}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102521}, doi = {10.1016/J.JISA.2020.102521}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HouYZZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhanM20, author = {Haibat Khan and Keith M. Martin}, title = {A survey of subscription privacy on the 5G radio interface - The past, present and future}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102537}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102537}, doi = {10.1016/J.JISA.2020.102537}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhanM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunduDMC20, author = {Nibedita Kundu and Sumit Kumar Debnath and Dheerendra Mishra and Tanmay Choudhury}, title = {Post-quantum digital signature scheme based on multivariate cubic problem}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102512}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102512}, doi = {10.1016/J.JISA.2020.102512}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KunduDMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KushwahR20, author = {Gopal Singh Kushwah and Virender Ranga}, title = {Voting extreme learning machine based distributed denial of service attack detection in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102532}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102532}, doi = {10.1016/J.JISA.2020.102532}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KushwahR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Li20, author = {Hui Li}, title = {Pseudo-random scalar multiplication based on group isomorphism}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102534}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102534}, doi = {10.1016/J.JISA.2020.102534}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Li20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraA20, author = {Zeesha Mishra and Bibhudendra Acharya}, title = {High throughput and low area architectures of secure IoT algorithm for medical image encryption}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102533}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102533}, doi = {10.1016/J.JISA.2020.102533}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MishraA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/OkumuraOS20, author = {Naomi Okumura and Kazuhiro Ogata and Yoichi Shinoda}, title = {Formal analysis of {RFC} 8120 authentication protocol for {HTTP} under different assumptions}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102529}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102529}, doi = {10.1016/J.JISA.2020.102529}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/OkumuraOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PakniatSE20, author = {Nasrollah Pakniat and Danial Shiraly and Ziba Eslami}, title = {Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102525}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102525}, doi = {10.1016/J.JISA.2020.102525}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PakniatSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QurashiAK20, author = {Mohammed Al Qurashi and Constantinos Marios Angelopoulos and Vasilios Katos}, title = {An architecture for resilient intrusion detection in ad-hoc networks}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102530}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102530}, doi = {10.1016/J.JISA.2020.102530}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QurashiAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RomdhaneY20, author = {Imene Romdhane and Heba Yuksel}, title = {A low-complexity security technique in physical layer for fixed LiFi communication systems}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102514}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102514}, doi = {10.1016/J.JISA.2020.102514}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RomdhaneY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SazdarGMKW20, author = {Amir Mahdi Sazdar and Seyed Ali Ghorashi and Vahideh Moghtadaiee and Ahmad Khonsari and David Windridge}, title = {A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102515}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102515}, doi = {10.1016/J.JISA.2020.102515}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SazdarGMKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SeiboldSHE20, author = {Clemens Seibold and Wojciech Samek and Anna Hilsmann and Peter Eisert}, title = {Accurate and robust neural networks for face morphing attack detection}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102526}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102526}, doi = {10.1016/J.JISA.2020.102526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SeiboldSHE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SureshkumarAOK20, author = {Venkatasamy Sureshkumar and Ruhul Amin and Mohammad S. Obaidat and Isswarya Karthikeyan}, title = {An enhanced mutual authentication and key establishment protocol for {TMIS} using chaotic map}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102539}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102539}, doi = {10.1016/J.JISA.2020.102539}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SureshkumarAOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SusiloTY20, author = {Willy Susilo and Joseph Tonien and Guomin Yang}, title = {A generalised bound for the Wiener attack on {RSA}}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102531}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102531}, doi = {10.1016/J.JISA.2020.102531}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SusiloTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangWXWZ20, author = {Chen Wang and Andi Wang and Jian Xu and Qiang Wang and Fucai Zhou}, title = {Outsourced privacy-preserving decision tree classification service over encrypted data}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102517}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102517}, doi = {10.1016/J.JISA.2020.102517}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangWXWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiongWSY20, author = {Hu Xiong and Yan Wu and Chunhua Su and Kuo{-}Hui Yeh}, title = {A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102507}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102507}, doi = {10.1016/J.JISA.2020.102507}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XiongWSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YadollahiENLC20, author = {Mehdi Yadollahi and Rasul Enayatifar and Hossein Nematzadeh and Malrey Lee and Jae{-}Young Choi}, title = {A novel image security technique based on nucleic acid concepts}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102505}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102505}, doi = {10.1016/J.JISA.2020.102505}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YadollahiENLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.