Search dblp for Publications

export results for "toc:db/journals/istr/istr70.bht:"

 download as .bib file

@article{DBLP:journals/istr/AhalawatBTP22a,
  author       = {Anchal Ahalawat and
                  Korra Sathya Babu and
                  Ashok Kumar Turuk and
                  Sanjeev Patel},
  title        = {Corrigendum to "A low-rate DDoS detection and mitigation for {SDN}
                  using Renyi Entropy with Packet Drop" [Journal of Information Security
                  and Applications 68 {(2022)} 103212]},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103344},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103344},
  doi          = {10.1016/J.JISA.2022.103344},
  timestamp    = {Mon, 14 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AhalawatBTP22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlorainiJRB22,
  author       = {Fatimah Aloraini and
                  Amir Javed and
                  Omer F. Rana and
                  Pete Burnap},
  title        = {Adversarial machine learning in IoT from an insider point of view},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103341},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103341},
  doi          = {10.1016/J.JISA.2022.103341},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlorainiJRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlsuhibanyP22,
  author       = {Suliman A. Alsuhibany and
                  Mohammad Tanvir Parvez},
  title        = {Attack-filtered interactive arabic CAPTCHAs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103318},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103318},
  doi          = {10.1016/J.JISA.2022.103318},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AlsuhibanyP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChefranovO22,
  author       = {Alexander G. Chefranov and
                  G{\"{u}}rc{\"{u}} {\"{O}}z},
  title        = {Adaptive to pixel value and pixel value difference irreversible spatial
                  data hiding method using modified {LSB} for grayscale images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103314},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103314},
  doi          = {10.1016/J.JISA.2022.103314},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChefranovO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenGTD22,
  author       = {Jinhai Chen and
                  Zheng Gong and
                  Yufeng Tang and
                  Xinfeng Dong},
  title        = {A comprehensive analysis of lightweight 8-bit sboxes from iterative
                  structures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103302},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103302},
  doi          = {10.1016/J.JISA.2022.103302},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenGTD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ContiVV22,
  author       = {Mauro Conti and
                  P. Vinod and
                  Alessio Vitella},
  title        = {Obfuscation detection in Android applications using deep learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103311},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103311},
  doi          = {10.1016/J.JISA.2022.103311},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ContiVV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FarzadniaSN22,
  author       = {Ehsan Farzadnia and
                  Hossein Shirazi and
                  Alireza Nowroozi},
  title        = {Corrigendum to 'A novel sophisticated hybrid method for intrusion
                  detection using the artificial immune system': Journal of Information
                  Security and Applications Volume 58, May 2021, 102721},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103349},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103349},
  doi          = {10.1016/J.JISA.2022.103349},
  timestamp    = {Mon, 14 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FarzadniaSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HussainIB22,
  author       = {Muhammad Hussain and
                  Nadeem Iqbal and
                  Zia Bashir},
  title        = {A chaotic image encryption scheme based on multi-directional confusion
                  and diffusion operations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103347},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103347},
  doi          = {10.1016/J.JISA.2022.103347},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HussainIB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KernBGFP22,
  author       = {Sascha Kern and
                  Thomas Baumer and
                  Sebastian Groll and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Optimization of Access Control Policies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103301},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103301},
  doi          = {10.1016/J.JISA.2022.103301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KernBGFP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuHXSN22,
  author       = {Tian Liu and
                  Xueyang Hu and
                  Hairuo Xu and
                  Tao Shu and
                  Diep N. Nguyen},
  title        = {High-accuracy low-cost privacy-preserving federated learning in IoT
                  systems via adaptive perturbation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103309},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103309},
  doi          = {10.1016/J.JISA.2022.103309},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiuHXSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LuengoCGHC22,
  author       = {Elena Almaraz Luengo and
                  Marcos Brian Leiva Cerna and
                  Luis Javier Garc{\'{\i}}a{-}Villalba and
                  Darren Hurley{-}Smith and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro},
  title        = {Sensitivity and uniformity in statistical randomness tests},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103322},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103322},
  doi          = {10.1016/J.JISA.2022.103322},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LuengoCGHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MurtazaTTARH22,
  author       = {Malik Hamza Murtaza and
                  Hasan Tahir and
                  Shahzaib Tahir and
                  Zahoor Ahmed Alizai and
                  Qaiser Riaz and
                  Mehdi Hussain},
  title        = {A portable hardware security module and cryptographic key generator},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103332},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103332},
  doi          = {10.1016/J.JISA.2022.103332},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MurtazaTTARH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Padayachee22,
  author       = {Keshnee Padayachee},
  title        = {Understanding the effects of situational crime prevention and personality
                  factors on insider compliance},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103338},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103338},
  doi          = {10.1016/J.JISA.2022.103338},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Padayachee22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RezaeiAFA22,
  author       = {Aref Rezaei and
                  Yasaman Ahmadiadli and
                  Leili Farzinvash and
                  Mohammad Asadpour},
  title        = {Low distortion and adaptive image steganography by enhancing DBSCAN,
                  Sobel operator, and {XOR} coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103343},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103343},
  doi          = {10.1016/J.JISA.2022.103343},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RezaeiAFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SardarU22,
  author       = {Alamgir Sardar and
                  Saiyed Umer},
  title        = {Implementation of face recognition system using BioCryptosystem as
                  template protection scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103317},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103317},
  doi          = {10.1016/J.JISA.2022.103317},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SardarU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShiYMZ22,
  author       = {Ming Shi and
                  Yang Yang and
                  Jian Meng and
                  Weiming Zhang},
  title        = {Reversible data hiding with enhancing contrast and preserving brightness
                  in medical image},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103324},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103324},
  doi          = {10.1016/J.JISA.2022.103324},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShiYMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TehB22,
  author       = {Je Sen Teh and
                  Alex Biryukov},
  title        = {Differential cryptanalysis of {WARP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103316},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103316},
  doi          = {10.1016/J.JISA.2022.103316},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TehB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TsengFL22,
  author       = {Yi{-}Fan Tseng and
                  Chun{-}I Fan and
                  Zi{-}Cheng Liu},
  title        = {Fast keyword search over encrypted data with short ciphertext in clouds},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103320},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103320},
  doi          = {10.1016/J.JISA.2022.103320},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TsengFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/UllahJHDUF22,
  author       = {Shamsher Ullah and
                  Jiangbin Zheng and
                  Muhammad Tanveer Hussain and
                  Nizamud Din and
                  Farhan Ullah and
                  Muhammad Umar Farooq},
  title        = {A perspective trend of hyperelliptic curve cryptosystem for lighted
                  weighted environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103346},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103346},
  doi          = {10.1016/J.JISA.2022.103346},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/UllahJHDUF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/UlusoyKE22,
  author       = {Sirri Erdem Ulusoy and
                  Orhun Kara and
                  Mehmet {\"{O}}nder Efe},
  title        = {Plaintext recovery and tag guessing attacks on authenticated encryption
                  algorithm {COLM}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103342},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103342},
  doi          = {10.1016/J.JISA.2022.103342},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/UlusoyKE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VallabhadasS22,
  author       = {Dilip Kumar Vallabhadas and
                  Mulagala Sandhya},
  title        = {Securing multimodal biometric template using local random projection
                  and homomorphic encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103339},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103339},
  doi          = {10.1016/J.JISA.2022.103339},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VallabhadasS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangJXKH22,
  author       = {Yifan Wang and
                  Xiaoying Jia and
                  Yongbo Xia and
                  Muhammad Khurram Khan and
                  Debiao He},
  title        = {A blockchain-based conditional privacy-preserving authentication scheme
                  for edge computing services},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103334},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103334},
  doi          = {10.1016/J.JISA.2022.103334},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangJXKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangZZ22,
  author       = {Quanyv Wang and
                  Xiaoqiang Zhang and
                  Xiaohu Zhao},
  title        = {Image encryption algorithm based on improved Zigzag transformation
                  and quaternary {DNA} coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103340},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103340},
  doi          = {10.1016/J.JISA.2022.103340},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuXLZHZ22,
  author       = {Runqing Xu and
                  Zejun Xiang and
                  Da Lin and
                  Shasha Zhang and
                  Debiao He and
                  Xiangyong Zeng},
  title        = {High-throughput block cipher implementations with {SIMD}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103333},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103333},
  doi          = {10.1016/J.JISA.2022.103333},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XuXLZHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWY22,
  author       = {Cheng{-}Hsing Yang and
                  Chi{-}Yao Weng and
                  Yu{-}Zhen Yang},
  title        = {{TPEIP:} Thumbnail preserving encryption based on sum preserving for
                  image privacy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103352},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103352},
  doi          = {10.1016/J.JISA.2022.103352},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YiTY22,
  author       = {Yufeng Yi and
                  Wuzheng Tan and
                  Yaxi Yang},
  title        = {Efficient Privacy-preserving Non-exhaustive Nearest Neighbor Search
                  of large-scale databases},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103335},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103335},
  doi          = {10.1016/J.JISA.2022.103335},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YiTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuW22,
  author       = {Huifang Yu and
                  Han Wang},
  title        = {Elliptic curve threshold signature scheme for blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103345},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103345},
  doi          = {10.1016/J.JISA.2022.103345},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YuW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZouCTW22,
  author       = {Binghui Zou and
                  Chunjie Cao and
                  Fangjian Tao and
                  Longjuan Wang},
  title        = {IMCLNet: {A} lightweight deep neural network for Image-based Malware
                  Classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103313},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103313},
  doi          = {10.1016/J.JISA.2022.103313},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZouCTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics