Search dblp for Publications

export results for "toc:db/journals/istr/istr76.bht:"

 download as .bib file

@article{DBLP:journals/istr/BakhtinaMS23,
  author       = {Mariia Bakhtina and
                  Raimundas Matulevicius and
                  Mari Seeba},
  title        = {Tool-supported method for privacy analysis of a business process model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103525},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103525},
  doi          = {10.1016/J.JISA.2023.103525},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BakhtinaMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenZZ23,
  author       = {Chao Chen and
                  Fangguo Zhang and
                  Changan Zhao},
  title        = {Isogeny computation on Kummer lines and applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103546},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103546},
  doi          = {10.1016/J.JISA.2023.103546},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FinoginaH23,
  author       = {Tamara Finogina and
                  Javier Herranz},
  title        = {On remote electronic voting with both coercion resistance and cast-as-intended
                  verifiability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103554},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103554},
  doi          = {10.1016/J.JISA.2023.103554},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FinoginaH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoWLC23,
  author       = {Mengnan Gao and
                  Lifa Wu and
                  Qi Li and
                  Wei Chen},
  title        = {Anomaly traffic detection in IoT security using graph neural networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103532},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103532},
  doi          = {10.1016/J.JISA.2023.103532},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoWLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HarissN23,
  author       = {Khalil Hariss and
                  Hassan N. Noura},
  title        = {Homomorphic additive lightweight block cipher scheme for securing
                  IoT applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103540},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103540},
  doi          = {10.1016/J.JISA.2023.103540},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HarissN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HemalathaMKGS23,
  author       = {J. Hemalatha and
                  Sekar Mohan and
                  Chandan Kumar and
                  Adnan Gutub and
                  Aditya Kumar Sahu},
  title        = {Towards improving the performance of blind image steganalyzer using
                  third-order {SPAM} features and ensemble classifier},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103541},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103541},
  doi          = {10.1016/J.JISA.2023.103541},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HemalathaMKGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HouMDWR23,
  author       = {Shen Hou and
                  Yanzhou Ma and
                  Ding Deng and
                  Zhenyu Wang and
                  Guolei Ren},
  title        = {Modeling and physical attack resistant authentication protocol with
                  double PUFs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103543},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103543},
  doi          = {10.1016/J.JISA.2023.103543},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HouMDWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KimYZJ23,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang and
                  Zhili Zhou and
                  Ki{-}Hyun Jung},
  title        = {Dual efficient reversible data hiding using Hamming code and {OPAP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103544},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103544},
  doi          = {10.1016/J.JISA.2023.103544},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KimYZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LauIACY23,
  author       = {Terry Shue Chien Lau and
                  Fedor Ivanov and
                  Muhammad Rezal Kamel Ariffin and
                  Ji{-}Jian Chin and
                  Timothy Tzen Vun Yap},
  title        = {New code-based cryptosystems via the {IKKR} framework},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103530},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103530},
  doi          = {10.1016/J.JISA.2023.103530},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LauIACY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiBCFGE23,
  author       = {Li Li and
                  Yu Bai and
                  Ching{-}Chun Chang and
                  Yunyuan Fan and
                  Wei Gu and
                  Mahmoud Emam},
  title        = {Anti-pruning multi-watermarking for ownership proof of steganographic
                  autoencoders},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103548},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103548},
  doi          = {10.1016/J.JISA.2023.103548},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiBCFGE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiangLZW23,
  author       = {Yanrong Liang and
                  Yanping Li and
                  Kai Zhang and
                  Zhenqiang Wu},
  title        = {{VMSE:} Verifiable multi-keyword searchable encryption in multi-user
                  setting supporting keywords updating},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103518},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103518},
  doi          = {10.1016/J.JISA.2023.103518},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiangLZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuLLY23,
  author       = {Mengjuan Liu and
                  Jiang Liu and
                  Chenyang Liu and
                  Kuo{-}Hui Yeh},
  title        = {A task-oriented neural dialogue system capable of knowledge accessing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103551},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103551},
  doi          = {10.1016/J.JISA.2023.103551},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NikooghadamSS23,
  author       = {Mahdi Nikooghadam and
                  Hamid Reza Shahriari and
                  Saeid Tousi Saeidi},
  title        = {{HAKECC:} Highly efficient authentication and key agreement scheme
                  based on {ECDH} for {RFID} in {IOT} environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103523},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103523},
  doi          = {10.1016/J.JISA.2023.103523},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NikooghadamSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NouraSC23,
  author       = {Hassan N. Noura and
                  Ola Salman and
                  Ali Chehab},
  title        = {Conception of efficient key-dependent binary diffusion matrix structures
                  for dynamic cryptographic algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103514},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103514},
  doi          = {10.1016/J.JISA.2023.103514},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NouraSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QiZXWC23,
  author       = {Jianxiang Qi and
                  Ning Zheng and
                  Ming Xu and
                  Xiaodong Wang and
                  Yunzhi Chen},
  title        = {A multi-dimensional trust model for misbehavior detection in vehicular
                  ad hoc networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103528},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103528},
  doi          = {10.1016/J.JISA.2023.103528},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QiZXWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RaiOCA23,
  author       = {Arun Kumar Rai and
                  Hari Om and
                  Satish Chand and
                  Saurabh Agarwal},
  title        = {Reversible data hiding in encrypted image using two-pass pixel value
                  ordering},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103545},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103545},
  doi          = {10.1016/J.JISA.2023.103545},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RaiOCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SchneiderB23,
  author       = {Johannes Schneider and
                  Frank Breitinger},
  title        = {Towards {AI} forensics: Did the artificial intelligence system do
                  it?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103517},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103517},
  doi          = {10.1016/J.JISA.2023.103517},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SchneiderB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShawD23,
  author       = {Surbhi Shaw and
                  Ratna Dutta},
  title        = {A quantum resistant multi-user signcryption scheme featuring key invisibility
                  for Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103549},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103549},
  doi          = {10.1016/J.JISA.2023.103549},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShawD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SoltaniOSJ23,
  author       = {Mahdi Soltani and
                  Behzad Ousat and
                  Mahdi Jafari Siavoshani and
                  Amir Hossein Jahangir},
  title        = {An adaptable deep learning-based intrusion detection system to zero-day
                  attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103516},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103516},
  doi          = {10.1016/J.JISA.2023.103516},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SoltaniOSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TangCLWT23,
  author       = {Zongwei Tang and
                  Xiuli Chai and
                  Yang Lu and
                  Binjie Wang and
                  Yong Tan},
  title        = {An end-to-end screen shooting resilient blind watermarking scheme
                  for medical images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103547},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103547},
  doi          = {10.1016/J.JISA.2023.103547},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TangCLWT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TeganeSB23,
  author       = {Saher Tegane and
                  Fouzi Semchedine and
                  Abdelmalek Boudries},
  title        = {An extended Attribute-based access control with controlled delegation
                  in IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103473},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103473},
  doi          = {10.1016/J.JISA.2023.103473},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TeganeSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TengTJ23,
  author       = {Weijian Teng and
                  Je Sen Teh and
                  Norziana Jamil},
  title        = {On the security of lightweight block ciphers against neural distinguishers:
                  Observations on LBC-IoT and {SLIM}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103531},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103531},
  doi          = {10.1016/J.JISA.2023.103531},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TengTJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TuZHCZ23,
  author       = {Tengfei Tu and
                  Hua Zhang and
                  Yangye Hu and
                  Dong Cui and
                  Xilin Zhai},
  title        = {A detector for Android repackaged applications with layout-fingerprint},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103527},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103527},
  doi          = {10.1016/J.JISA.2023.103527},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TuZHCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XieSZWG23,
  author       = {Chenlu Xie and
                  Runhua Shi and
                  XiaoXu Zhang and
                  Pengbo Wang and
                  WanPeng Guo},
  title        = {Verifiable outsourcing EMRs scheme with attribute-based encryption
                  in cloud-edge environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103526},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103526},
  doi          = {10.1016/J.JISA.2023.103526},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XieSZWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuNLH23,
  author       = {Han Xu and
                  Priyadarsi Nanda and
                  Jie Liang and
                  Xiangjian He},
  title        = {FCH, an incentive framework for data-owner dominated federated learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103521},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103521},
  doi          = {10.1016/J.JISA.2023.103521},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuNLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YaoRWWYY23,
  author       = {Siyu Yao and
                  Yizhi Ren and
                  Dong Wang and
                  Yeru Wang and
                  Weifeng Yin and
                  Lifeng Yuan},
  title        = {{SNN-PPRL:} {A} secure record matching scheme based on siamese neural
                  network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103529},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103529},
  doi          = {10.1016/J.JISA.2023.103529},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YaoRWWYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangCLCYG23,
  author       = {Bo Zhang and
                  Helei Cui and
                  Xiaoning Liu and
                  Yaxing Chen and
                  Zhiwen Yu and
                  Bin Guo},
  title        = {Decentralized and secure deduplication with dynamic ownership in MLaaS},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103524},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103524},
  doi          = {10.1016/J.JISA.2023.103524},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangCLCYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangFZH23,
  author       = {Qiuyu Zhang and
                  Minrui Fu and
                  Zhenyu Zhao and
                  Yibo Huang},
  title        = {Searchable encryption over encrypted speech retrieval scheme in cloud
                  storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103542},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103542},
  doi          = {10.1016/J.JISA.2023.103542},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangFZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics