Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr63.bht:"
@article{DBLP:journals/istr/AnC21, author = {Haoyang An and Jiageng Chen}, title = {ElearnChain: {A} privacy-preserving consortium blockchain system for e-learning educational records}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103013}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103013}, doi = {10.1016/J.JISA.2021.103013}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AparnaBSVSRPE21, author = {H. Aparna and B. Bhumijaa and R. Santhiyadevi and K. Vaishanavi and M. Sathanarayanan and Amirtharajan Rengarajan and Padmapriya Praveenkumar and Ahmed A. Abd El{-}Latif}, title = {Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102972}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102972}, doi = {10.1016/J.JISA.2021.102972}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AparnaBSVSRPE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ArunpandianD21, author = {S. Arunpandian and S. S. Dhenakaran}, title = {A novel key and image concealing with static-dynamic pattern using modified periodic table}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103019}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103019}, doi = {10.1016/J.JISA.2021.103019}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ArunpandianD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BarretoFS21, author = {Luciano Barreto and Joni da Silva Fraga and Frank Siqueira}, title = {An intrusion tolerant identity provider with user attributes confidentiality}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103045}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103045}, doi = {10.1016/J.JISA.2021.103045}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BarretoFS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BerguigLH21, author = {Yousra Berguig and Jalal Laassiri and Sanae Hanaoui}, title = {Anonymous and lightweight secure authentication protocol for mobile Agent system}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103007}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103007}, doi = {10.1016/J.JISA.2021.103007}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BerguigLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BraekenCT21, author = {An Braeken and Ji{-}Jian Chin and Syh{-}Yuan Tan}, title = {{ECQV-IBI:} Identity-based identification with implicit certification}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103027}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103027}, doi = {10.1016/J.JISA.2021.103027}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BraekenCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChiuMJ21, author = {Wei{-}Yang Chiu and Weizhi Meng and Christian Damsgaard Jensen}, title = {My data, my control: {A} secure data sharing and access scheme over blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103020}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103020}, doi = {10.1016/J.JISA.2021.103020}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChiuMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DasGK21, author = {Tanmoy Kanti Das and Subhojit Ghosh and Ebha Koley}, title = {Prevention and detection of {FDIA} on power-network protection scheme using multiple support set}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103054}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103054}, doi = {10.1016/J.JISA.2021.103054}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DasGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DingGWJG21, author = {Lin Ding and Dawu Gu and Lei Wang and Chenhui Jin and Jie Guan}, title = {A real-time related key attack on the {WG-16} stream cipher for securing 4G-LTE networks}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103015}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103015}, doi = {10.1016/J.JISA.2021.103015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DingGWJG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FehisNK21, author = {Saad Fehis and Omar Nouali and M. Tahar Kechadi}, title = {Secure encryption key management as a SecaaS based on Chinese wall security policy}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102975}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102975}, doi = {10.1016/J.JISA.2021.102975}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FehisNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Hernandez-Castro21, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and David F. Barrero and Mar{\'{\i}}a D. R.{-}Moreno}, title = {{BASECASS:} {A} methodology for CAPTCHAs security assurance}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103018}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103018}, doi = {10.1016/J.JISA.2021.103018}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Hernandez-Castro21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangW21, author = {Hai Huang and Luyao Wang}, title = {Efficient privacy-preserving face verification scheme}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103055}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103055}, doi = {10.1016/J.JISA.2021.103055}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HuangW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IslamB21, author = {SK Hafizul Islam and Swagatam Basu}, title = {{PB-3PAKA:} Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103026}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103026}, doi = {10.1016/J.JISA.2021.103026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IslamB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KamilO21, author = {Ismaila Adeniyi Kamil and Sunday Oyinlola Ogundoyin}, title = {A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102994}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102994}, doi = {10.1016/J.JISA.2021.102994}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KamilO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KekulEA21, author = {Hakan Kek{\"{u}}l and Burhan Ergen and Halil Arslan}, title = {A multiclass hybrid approach to estimating software vulnerability vectors and severity score}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103028}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103028}, doi = {10.1016/J.JISA.2021.103028}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KekulEA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhalidMAJ21, author = {Rabiya Khalid and Muhammad Waseem Malik and Turki Ali Alghamdi and Nadeem Javaid}, title = {A consortium blockchain based energy trading scheme for Electric Vehicles in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102998}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102998}, doi = {10.1016/J.JISA.2021.102998}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhalidMAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KimLAP21, author = {Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park}, title = {Practical dynamic group signature with efficient concurrent joins and batch verifications}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103003}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103003}, doi = {10.1016/J.JISA.2021.103003}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KimLAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KonyarS21, author = {Mehmet Zeki Konyar and Serdar Burak Solak}, title = {Efficient data hiding method for videos based on adaptive inverted {LSB332} and secure frame selection with enhanced Vigenere cipher}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103037}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103037}, doi = {10.1016/J.JISA.2021.103037}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KonyarS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LaiphrakpamWBBB21, author = {Dolendro Singh Laiphrakpam and Leepeng Singh Waikhom and Digambar Brahma and Pratikshit Baruah and Sarthak Biswas}, title = {Image compression-encryption scheme using {SPIHT} and chaotic systems}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103010}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103010}, doi = {10.1016/J.JISA.2021.103010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LaiphrakpamWBBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiGZWFY21, author = {Hao Li and Min Gao and Fengtao Zhou and Yueyang Wang and Qilin Fan and Linda Yang}, title = {Fusing hypergraph spectral features for shilling attack detection}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103051}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103051}, doi = {10.1016/J.JISA.2021.103051}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiGZWFY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiTB21, author = {Yue Li and Benedetta Tondi and Mauro Barni}, title = {Spread-Transform Dither Modulation Watermarking of Deep Neural Network}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103004}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103004}, doi = {10.1016/J.JISA.2021.103004}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiTB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LinWGY21, author = {Yijian Lin and Xiaoming Wang and Qingqing Gan and Mengting Yao}, title = {A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103022}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103022}, doi = {10.1016/J.JISA.2021.103022}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LinWGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mohit21, author = {Prerna Mohit}, title = {An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102992}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102992}, doi = {10.1016/J.JISA.2021.102992}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Mohit21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NavdetiBG21, author = {Chandrakant Navdeti and Indrajit Banerjee and Chandan Giri}, title = {Privacy preservation and secure data sharing scheme in fog based vehicular ad-hoc network}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103014}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103014}, doi = {10.1016/J.JISA.2021.103014}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NavdetiBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PareekP21a, author = {Gaurav Pareek and B. R. Purushothama}, title = {{KAPRE:} Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103009}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103009}, doi = {10.1016/J.JISA.2021.103009}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PareekP21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PengCQGJL21, author = {Jin{-}cheng Peng and Yunhe Cui and Qing Qian and Chun Guo and Chaohui Jiang and Saifei Li}, title = {{ADVICE:} Towards adaptive scheduling for data collection and DDoS detection in {SDN}}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103017}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103017}, doi = {10.1016/J.JISA.2021.103017}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PengCQGJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RabieBK21, author = {Tamer Rabie and Mohammed Baziyad and Ibrahim Kamel}, title = {Secure high payload steganography: {A} model-based approach}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103043}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103043}, doi = {10.1016/J.JISA.2021.103043}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RabieBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SabirGM21, author = {Shazia Sabir and Vandana Guleria and Deep Chandra Mishra}, title = {Security of multiple {RGB} images in the time domain and frequency domain}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103005}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103005}, doi = {10.1016/J.JISA.2021.103005}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SabirGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SahinKAK21, author = {Durmus {\"{O}}zkan Sahin and Oguz Emre Kural and Sedat Akleylek and Erdal Kili{\c{c}}}, title = {Permission-based Android malware analysis by using dimension reduction with {PCA} and {LDA}}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102995}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102995}, doi = {10.1016/J.JISA.2021.102995}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SahinKAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SenguptaL21, author = {Binanda Sengupta and Anantharaman Lakshminarayanan}, title = {DistriTrust: Distributed and low-latency access validation in zero-trust architecture}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103023}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103023}, doi = {10.1016/J.JISA.2021.103023}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SenguptaL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SoniPISK21, author = {Preeti Soni and Arup Kumar Pal and SK Hafizul Islam and Aadarsh Singh and Priyanshu Kumar}, title = {Provably secure and biometric-based secure access of e-Governance services using mobile devices}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103016}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103016}, doi = {10.1016/J.JISA.2021.103016}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SoniPISK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/StudiawanS21, author = {Hudan Studiawan and Ferdous Sohel}, title = {Anomaly detection in a forensic timeline with deep autoencoders}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103002}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103002}, doi = {10.1016/J.JISA.2021.103002}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/StudiawanS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Suzen21, author = {Ahmet Ali S{\"{u}}zen}, title = {{UNI-CAPTCHA:} {A} Novel Robust and Dynamic User-Non-Interaction {CAPTCHA} Model Based on Hybrid biLSTM+Softmax}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103036}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103036}, doi = {10.1016/J.JISA.2021.103036}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Suzen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VarandaSCOR21, author = {Artur Varanda and Leonel Santos and Rog{\'{e}}rio Lu{\'{\i}}s C. Costa and Adail Oliveira and Carlos Rabad{\~{a}}o}, title = {Log pseudonymization: Privacy maintenance in practice}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103021}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103021}, doi = {10.1016/J.JISA.2021.103021}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VarandaSCOR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VermaBST21, author = {Ashwin Verma and Pronaya Bhattacharya and Deepti Saraswat and Sudeep Tanwar}, title = {\emph{NyaYa}: Blockchain-based electronic law record management scheme for judicial investigations}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103025}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103025}, doi = {10.1016/J.JISA.2021.103025}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VermaBST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XueSWHWL21, author = {Mingfu Xue and Shichang Sun and Zhiyu Wu and Can He and Jian Wang and Weiqiang Liu}, title = {SocialGuard: An adversarial example based privacy-preserving technique for social images}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102993}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102993}, doi = {10.1016/J.JISA.2021.102993}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XueSWHWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YadavPS21, author = {Anil Yadav and Sujata Pandey and Rajat Kumar Singh}, title = {Lightweight capability-token for consent-based authentication protocol for smart sensor nodes}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103024}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103024}, doi = {10.1016/J.JISA.2021.103024}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YadavPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangKW21, author = {Ching{-}Nung Yang and Chung{-}Lun Kao and Chang{-}Ji Wang}, title = {Two-dimensional diagonal layer hash chain based key pre-distribution scheme}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103038}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103038}, doi = {10.1016/J.JISA.2021.103038}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Yavuz21, author = {Erdem Yavuz}, title = {A new parallel processing architecture for accelerating image encryption based on chaos}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103056}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103056}, doi = {10.1016/J.JISA.2021.103056}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Yavuz21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.