Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr76.bht:"
@article{DBLP:journals/istr/BakhtinaMS23, author = {Mariia Bakhtina and Raimundas Matulevicius and Mari Seeba}, title = {Tool-supported method for privacy analysis of a business process model}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103525}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103525}, doi = {10.1016/J.JISA.2023.103525}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BakhtinaMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenZZ23, author = {Chao Chen and Fangguo Zhang and Changan Zhao}, title = {Isogeny computation on Kummer lines and applications}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103546}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103546}, doi = {10.1016/J.JISA.2023.103546}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FinoginaH23, author = {Tamara Finogina and Javier Herranz}, title = {On remote electronic voting with both coercion resistance and cast-as-intended verifiability}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103554}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103554}, doi = {10.1016/J.JISA.2023.103554}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FinoginaH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoWLC23, author = {Mengnan Gao and Lifa Wu and Qi Li and Wei Chen}, title = {Anomaly traffic detection in IoT security using graph neural networks}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103532}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103532}, doi = {10.1016/J.JISA.2023.103532}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoWLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HarissN23, author = {Khalil Hariss and Hassan N. Noura}, title = {Homomorphic additive lightweight block cipher scheme for securing IoT applications}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103540}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103540}, doi = {10.1016/J.JISA.2023.103540}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HarissN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HemalathaMKGS23, author = {J. Hemalatha and Sekar Mohan and Chandan Kumar and Adnan Gutub and Aditya Kumar Sahu}, title = {Towards improving the performance of blind image steganalyzer using third-order {SPAM} features and ensemble classifier}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103541}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103541}, doi = {10.1016/J.JISA.2023.103541}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HemalathaMKGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HouMDWR23, author = {Shen Hou and Yanzhou Ma and Ding Deng and Zhenyu Wang and Guolei Ren}, title = {Modeling and physical attack resistant authentication protocol with double PUFs}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103543}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103543}, doi = {10.1016/J.JISA.2023.103543}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HouMDWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KimYZJ23, author = {Cheonshik Kim and Ching{-}Nung Yang and Zhili Zhou and Ki{-}Hyun Jung}, title = {Dual efficient reversible data hiding using Hamming code and {OPAP}}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103544}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103544}, doi = {10.1016/J.JISA.2023.103544}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KimYZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LauIACY23, author = {Terry Shue Chien Lau and Fedor Ivanov and Muhammad Rezal Kamel Ariffin and Ji{-}Jian Chin and Timothy Tzen Vun Yap}, title = {New code-based cryptosystems via the {IKKR} framework}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103530}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103530}, doi = {10.1016/J.JISA.2023.103530}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LauIACY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiBCFGE23, author = {Li Li and Yu Bai and Ching{-}Chun Chang and Yunyuan Fan and Wei Gu and Mahmoud Emam}, title = {Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103548}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103548}, doi = {10.1016/J.JISA.2023.103548}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiBCFGE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiangLZW23, author = {Yanrong Liang and Yanping Li and Kai Zhang and Zhenqiang Wu}, title = {{VMSE:} Verifiable multi-keyword searchable encryption in multi-user setting supporting keywords updating}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103518}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103518}, doi = {10.1016/J.JISA.2023.103518}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiangLZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuLLY23, author = {Mengjuan Liu and Jiang Liu and Chenyang Liu and Kuo{-}Hui Yeh}, title = {A task-oriented neural dialogue system capable of knowledge accessing}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103551}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103551}, doi = {10.1016/J.JISA.2023.103551}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NikooghadamSS23, author = {Mahdi Nikooghadam and Hamid Reza Shahriari and Saeid Tousi Saeidi}, title = {{HAKECC:} Highly efficient authentication and key agreement scheme based on {ECDH} for {RFID} in {IOT} environment}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103523}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103523}, doi = {10.1016/J.JISA.2023.103523}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NikooghadamSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NouraSC23, author = {Hassan N. Noura and Ola Salman and Ali Chehab}, title = {Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103514}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103514}, doi = {10.1016/J.JISA.2023.103514}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NouraSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QiZXWC23, author = {Jianxiang Qi and Ning Zheng and Ming Xu and Xiaodong Wang and Yunzhi Chen}, title = {A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103528}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103528}, doi = {10.1016/J.JISA.2023.103528}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QiZXWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RaiOCA23, author = {Arun Kumar Rai and Hari Om and Satish Chand and Saurabh Agarwal}, title = {Reversible data hiding in encrypted image using two-pass pixel value ordering}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103545}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103545}, doi = {10.1016/J.JISA.2023.103545}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RaiOCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SchneiderB23, author = {Johannes Schneider and Frank Breitinger}, title = {Towards {AI} forensics: Did the artificial intelligence system do it?}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103517}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103517}, doi = {10.1016/J.JISA.2023.103517}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SchneiderB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShawD23, author = {Surbhi Shaw and Ratna Dutta}, title = {A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103549}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103549}, doi = {10.1016/J.JISA.2023.103549}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShawD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SoltaniOSJ23, author = {Mahdi Soltani and Behzad Ousat and Mahdi Jafari Siavoshani and Amir Hossein Jahangir}, title = {An adaptable deep learning-based intrusion detection system to zero-day attacks}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103516}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103516}, doi = {10.1016/J.JISA.2023.103516}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SoltaniOSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TangCLWT23, author = {Zongwei Tang and Xiuli Chai and Yang Lu and Binjie Wang and Yong Tan}, title = {An end-to-end screen shooting resilient blind watermarking scheme for medical images}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103547}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103547}, doi = {10.1016/J.JISA.2023.103547}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TangCLWT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TeganeSB23, author = {Saher Tegane and Fouzi Semchedine and Abdelmalek Boudries}, title = {An extended Attribute-based access control with controlled delegation in IoT}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103473}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103473}, doi = {10.1016/J.JISA.2023.103473}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TeganeSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TengTJ23, author = {Weijian Teng and Je Sen Teh and Norziana Jamil}, title = {On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and {SLIM}}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103531}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103531}, doi = {10.1016/J.JISA.2023.103531}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TengTJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TuZHCZ23, author = {Tengfei Tu and Hua Zhang and Yangye Hu and Dong Cui and Xilin Zhai}, title = {A detector for Android repackaged applications with layout-fingerprint}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103527}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103527}, doi = {10.1016/J.JISA.2023.103527}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TuZHCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XieSZWG23, author = {Chenlu Xie and Runhua Shi and XiaoXu Zhang and Pengbo Wang and WanPeng Guo}, title = {Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103526}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103526}, doi = {10.1016/J.JISA.2023.103526}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XieSZWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuNLH23, author = {Han Xu and Priyadarsi Nanda and Jie Liang and Xiangjian He}, title = {FCH, an incentive framework for data-owner dominated federated learning}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103521}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103521}, doi = {10.1016/J.JISA.2023.103521}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XuNLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YaoRWWYY23, author = {Siyu Yao and Yizhi Ren and Dong Wang and Yeru Wang and Weifeng Yin and Lifeng Yuan}, title = {{SNN-PPRL:} {A} secure record matching scheme based on siamese neural network}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103529}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103529}, doi = {10.1016/J.JISA.2023.103529}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YaoRWWYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangCLCYG23, author = {Bo Zhang and Helei Cui and Xiaoning Liu and Yaxing Chen and Zhiwen Yu and Bin Guo}, title = {Decentralized and secure deduplication with dynamic ownership in MLaaS}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103524}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103524}, doi = {10.1016/J.JISA.2023.103524}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangCLCYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangFZH23, author = {Qiuyu Zhang and Minrui Fu and Zhenyu Zhao and Yibo Huang}, title = {Searchable encryption over encrypted speech retrieval scheme in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103542}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103542}, doi = {10.1016/J.JISA.2023.103542}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangFZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.