Search dblp for Publications

export results for "toc:db/journals/istr/istr63.bht:"

 download as .bib file

@article{DBLP:journals/istr/AnC21,
  author       = {Haoyang An and
                  Jiageng Chen},
  title        = {ElearnChain: {A} privacy-preserving consortium blockchain system for
                  e-learning educational records},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103013},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103013},
  doi          = {10.1016/J.JISA.2021.103013},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AparnaBSVSRPE21,
  author       = {H. Aparna and
                  B. Bhumijaa and
                  R. Santhiyadevi and
                  K. Vaishanavi and
                  M. Sathanarayanan and
                  Amirtharajan Rengarajan and
                  Padmapriya Praveenkumar and
                  Ahmed A. Abd El{-}Latif},
  title        = {Double layered Fridrich structure to conserve medical data privacy
                  using quantum cryptosystem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102972},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102972},
  doi          = {10.1016/J.JISA.2021.102972},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AparnaBSVSRPE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ArunpandianD21,
  author       = {S. Arunpandian and
                  S. S. Dhenakaran},
  title        = {A novel key and image concealing with static-dynamic pattern using
                  modified periodic table},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103019},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103019},
  doi          = {10.1016/J.JISA.2021.103019},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ArunpandianD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BarretoFS21,
  author       = {Luciano Barreto and
                  Joni da Silva Fraga and
                  Frank Siqueira},
  title        = {An intrusion tolerant identity provider with user attributes confidentiality},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103045},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103045},
  doi          = {10.1016/J.JISA.2021.103045},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BarretoFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BerguigLH21,
  author       = {Yousra Berguig and
                  Jalal Laassiri and
                  Sanae Hanaoui},
  title        = {Anonymous and lightweight secure authentication protocol for mobile
                  Agent system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103007},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103007},
  doi          = {10.1016/J.JISA.2021.103007},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BerguigLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BraekenCT21,
  author       = {An Braeken and
                  Ji{-}Jian Chin and
                  Syh{-}Yuan Tan},
  title        = {{ECQV-IBI:} Identity-based identification with implicit certification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103027},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103027},
  doi          = {10.1016/J.JISA.2021.103027},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BraekenCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChiuMJ21,
  author       = {Wei{-}Yang Chiu and
                  Weizhi Meng and
                  Christian Damsgaard Jensen},
  title        = {My data, my control: {A} secure data sharing and access scheme over
                  blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103020},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103020},
  doi          = {10.1016/J.JISA.2021.103020},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChiuMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DasGK21,
  author       = {Tanmoy Kanti Das and
                  Subhojit Ghosh and
                  Ebha Koley},
  title        = {Prevention and detection of {FDIA} on power-network protection scheme
                  using multiple support set},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103054},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103054},
  doi          = {10.1016/J.JISA.2021.103054},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DasGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DingGWJG21,
  author       = {Lin Ding and
                  Dawu Gu and
                  Lei Wang and
                  Chenhui Jin and
                  Jie Guan},
  title        = {A real-time related key attack on the {WG-16} stream cipher for securing
                  4G-LTE networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103015},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103015},
  doi          = {10.1016/J.JISA.2021.103015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DingGWJG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FehisNK21,
  author       = {Saad Fehis and
                  Omar Nouali and
                  M. Tahar Kechadi},
  title        = {Secure encryption key management as a SecaaS based on Chinese wall
                  security policy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102975},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102975},
  doi          = {10.1016/J.JISA.2021.102975},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FehisNK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Hernandez-Castro21,
  author       = {Carlos Javier Hern{\'{a}}ndez{-}Castro and
                  David F. Barrero and
                  Mar{\'{\i}}a D. R.{-}Moreno},
  title        = {{BASECASS:} {A} methodology for CAPTCHAs security assurance},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103018},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103018},
  doi          = {10.1016/J.JISA.2021.103018},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Hernandez-Castro21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangW21,
  author       = {Hai Huang and
                  Luyao Wang},
  title        = {Efficient privacy-preserving face verification scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103055},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103055},
  doi          = {10.1016/J.JISA.2021.103055},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HuangW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IslamB21,
  author       = {SK Hafizul Islam and
                  Swagatam Basu},
  title        = {{PB-3PAKA:} Password-based three-party authenticated key agreement
                  protocol for mobile devices in post-quantum environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103026},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103026},
  doi          = {10.1016/J.JISA.2021.103026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IslamB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KamilO21,
  author       = {Ismaila Adeniyi Kamil and
                  Sunday Oyinlola Ogundoyin},
  title        = {A lightweight certificateless authentication scheme and group key
                  agreement with dynamic updating mechanism for LTE-V-based internet
                  of vehicles in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102994},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102994},
  doi          = {10.1016/J.JISA.2021.102994},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KamilO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KekulEA21,
  author       = {Hakan Kek{\"{u}}l and
                  Burhan Ergen and
                  Halil Arslan},
  title        = {A multiclass hybrid approach to estimating software vulnerability
                  vectors and severity score},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103028},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103028},
  doi          = {10.1016/J.JISA.2021.103028},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KekulEA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhalidMAJ21,
  author       = {Rabiya Khalid and
                  Muhammad Waseem Malik and
                  Turki Ali Alghamdi and
                  Nadeem Javaid},
  title        = {A consortium blockchain based energy trading scheme for Electric Vehicles
                  in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102998},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102998},
  doi          = {10.1016/J.JISA.2021.102998},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhalidMAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KimLAP21,
  author       = {Hyoseung Kim and
                  Youngkyung Lee and
                  Michel Abdalla and
                  Jong Hwan Park},
  title        = {Practical dynamic group signature with efficient concurrent joins
                  and batch verifications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103003},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103003},
  doi          = {10.1016/J.JISA.2021.103003},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KimLAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KonyarS21,
  author       = {Mehmet Zeki Konyar and
                  Serdar Burak Solak},
  title        = {Efficient data hiding method for videos based on adaptive inverted
                  {LSB332} and secure frame selection with enhanced Vigenere cipher},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103037},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103037},
  doi          = {10.1016/J.JISA.2021.103037},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KonyarS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LaiphrakpamWBBB21,
  author       = {Dolendro Singh Laiphrakpam and
                  Leepeng Singh Waikhom and
                  Digambar Brahma and
                  Pratikshit Baruah and
                  Sarthak Biswas},
  title        = {Image compression-encryption scheme using {SPIHT} and chaotic systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103010},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103010},
  doi          = {10.1016/J.JISA.2021.103010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LaiphrakpamWBBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiGZWFY21,
  author       = {Hao Li and
                  Min Gao and
                  Fengtao Zhou and
                  Yueyang Wang and
                  Qilin Fan and
                  Linda Yang},
  title        = {Fusing hypergraph spectral features for shilling attack detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103051},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103051},
  doi          = {10.1016/J.JISA.2021.103051},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiGZWFY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiTB21,
  author       = {Yue Li and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Spread-Transform Dither Modulation Watermarking of Deep Neural Network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103004},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103004},
  doi          = {10.1016/J.JISA.2021.103004},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiTB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LinWGY21,
  author       = {Yijian Lin and
                  Xiaoming Wang and
                  Qingqing Gan and
                  Mengting Yao},
  title        = {A secure cross-domain authentication scheme with perfect forward security
                  and complete anonymity in fog computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103022},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103022},
  doi          = {10.1016/J.JISA.2021.103022},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LinWGY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mohit21,
  author       = {Prerna Mohit},
  title        = {An efficient mutual authentication and privacy prevention scheme for
                  e-healthcare monitoring},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102992},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102992},
  doi          = {10.1016/J.JISA.2021.102992},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Mohit21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NavdetiBG21,
  author       = {Chandrakant Navdeti and
                  Indrajit Banerjee and
                  Chandan Giri},
  title        = {Privacy preservation and secure data sharing scheme in fog based vehicular
                  ad-hoc network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103014},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103014},
  doi          = {10.1016/J.JISA.2021.103014},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NavdetiBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PareekP21a,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  title        = {{KAPRE:} Key-aggregate proxy re-encryption for secure and flexible
                  data sharing in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103009},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103009},
  doi          = {10.1016/J.JISA.2021.103009},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PareekP21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PengCQGJL21,
  author       = {Jin{-}cheng Peng and
                  Yunhe Cui and
                  Qing Qian and
                  Chun Guo and
                  Chaohui Jiang and
                  Saifei Li},
  title        = {{ADVICE:} Towards adaptive scheduling for data collection and DDoS
                  detection in {SDN}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103017},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103017},
  doi          = {10.1016/J.JISA.2021.103017},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PengCQGJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RabieBK21,
  author       = {Tamer Rabie and
                  Mohammed Baziyad and
                  Ibrahim Kamel},
  title        = {Secure high payload steganography: {A} model-based approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103043},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103043},
  doi          = {10.1016/J.JISA.2021.103043},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RabieBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SabirGM21,
  author       = {Shazia Sabir and
                  Vandana Guleria and
                  Deep Chandra Mishra},
  title        = {Security of multiple {RGB} images in the time domain and frequency
                  domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103005},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103005},
  doi          = {10.1016/J.JISA.2021.103005},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SabirGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahinKAK21,
  author       = {Durmus {\"{O}}zkan Sahin and
                  Oguz Emre Kural and
                  Sedat Akleylek and
                  Erdal Kili{\c{c}}},
  title        = {Permission-based Android malware analysis by using dimension reduction
                  with {PCA} and {LDA}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102995},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102995},
  doi          = {10.1016/J.JISA.2021.102995},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SahinKAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SenguptaL21,
  author       = {Binanda Sengupta and
                  Anantharaman Lakshminarayanan},
  title        = {DistriTrust: Distributed and low-latency access validation in zero-trust
                  architecture},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103023},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103023},
  doi          = {10.1016/J.JISA.2021.103023},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SenguptaL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SoniPISK21,
  author       = {Preeti Soni and
                  Arup Kumar Pal and
                  SK Hafizul Islam and
                  Aadarsh Singh and
                  Priyanshu Kumar},
  title        = {Provably secure and biometric-based secure access of e-Governance
                  services using mobile devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103016},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103016},
  doi          = {10.1016/J.JISA.2021.103016},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SoniPISK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/StudiawanS21,
  author       = {Hudan Studiawan and
                  Ferdous Sohel},
  title        = {Anomaly detection in a forensic timeline with deep autoencoders},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103002},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103002},
  doi          = {10.1016/J.JISA.2021.103002},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/StudiawanS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Suzen21,
  author       = {Ahmet Ali S{\"{u}}zen},
  title        = {{UNI-CAPTCHA:} {A} Novel Robust and Dynamic User-Non-Interaction {CAPTCHA}
                  Model Based on Hybrid biLSTM+Softmax},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103036},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103036},
  doi          = {10.1016/J.JISA.2021.103036},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Suzen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VarandaSCOR21,
  author       = {Artur Varanda and
                  Leonel Santos and
                  Rog{\'{e}}rio Lu{\'{\i}}s C. Costa and
                  Adail Oliveira and
                  Carlos Rabad{\~{a}}o},
  title        = {Log pseudonymization: Privacy maintenance in practice},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103021},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103021},
  doi          = {10.1016/J.JISA.2021.103021},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VarandaSCOR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VermaBST21,
  author       = {Ashwin Verma and
                  Pronaya Bhattacharya and
                  Deepti Saraswat and
                  Sudeep Tanwar},
  title        = {\emph{NyaYa}: Blockchain-based electronic law record management scheme
                  for judicial investigations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103025},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103025},
  doi          = {10.1016/J.JISA.2021.103025},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VermaBST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XueSWHWL21,
  author       = {Mingfu Xue and
                  Shichang Sun and
                  Zhiyu Wu and
                  Can He and
                  Jian Wang and
                  Weiqiang Liu},
  title        = {SocialGuard: An adversarial example based privacy-preserving technique
                  for social images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102993},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102993},
  doi          = {10.1016/J.JISA.2021.102993},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XueSWHWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YadavPS21,
  author       = {Anil Yadav and
                  Sujata Pandey and
                  Rajat Kumar Singh},
  title        = {Lightweight capability-token for consent-based authentication protocol
                  for smart sensor nodes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103024},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103024},
  doi          = {10.1016/J.JISA.2021.103024},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YadavPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangKW21,
  author       = {Ching{-}Nung Yang and
                  Chung{-}Lun Kao and
                  Chang{-}Ji Wang},
  title        = {Two-dimensional diagonal layer hash chain based key pre-distribution
                  scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103038},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103038},
  doi          = {10.1016/J.JISA.2021.103038},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Yavuz21,
  author       = {Erdem Yavuz},
  title        = {A new parallel processing architecture for accelerating image encryption
                  based on chaos},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103056},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103056},
  doi          = {10.1016/J.JISA.2021.103056},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Yavuz21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics