Search dblp for Publications

export results for "toc:db/journals/istr/istr55.bht:"

 download as .bib file

@article{DBLP:journals/istr/AlEroudAAA20,
  author       = {Ahmed Aleroud and
                  Emad Abu{-}Shanab and
                  Ahmad Al{-}Aiad and
                  Yazan Alshboul},
  title        = {An examination of susceptibility to spear phishing cyber attacks in
                  non-English speaking communities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102614},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102614},
  doi          = {10.1016/J.JISA.2020.102614},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AlEroudAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlhadawiLZA20,
  author       = {Hussam S. Alhadawi and
                  Dragan Lambic and
                  Mohamad Fadli Zolkipli and
                  Musheer Ahmad},
  title        = {Globalized firefly algorithm and chaos for designing substitution
                  box},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102671},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102671},
  doi          = {10.1016/J.JISA.2020.102671},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlhadawiLZA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AyebieS20,
  author       = {Edoukou Berenger Ayebie and
                  El Mamoun Souidi},
  title        = {Rank-metric code-based mutual authentication protocol for {RFID}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102598},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102598},
  doi          = {10.1016/J.JISA.2020.102598},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AyebieS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AyubSAMK20,
  author       = {Muhammad Faizan Ayub and
                  Muhammad Asad Saleem and
                  Izwa Altaf and
                  Khalid Mahmood and
                  Saru Kumari},
  title        = {Fuzzy extraction and {PUF} based three party authentication protocol
                  using {USB} as mass storage device},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102585},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102585},
  doi          = {10.1016/J.JISA.2020.102585},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AyubSAMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BabaghayouLALF20,
  author       = {Messaoud Babaghayou and
                  Nabila Labraoui and
                  Ado Adamou Abba Ari and
                  Nasreddine Lagraa and
                  Mohamed Amine Ferrag},
  title        = {Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc
                  networks: {A} survey},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102618},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102618},
  doi          = {10.1016/J.JISA.2020.102618},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BabaghayouLALF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bidgoly20,
  author       = {Amir Jalaly Bidgoly},
  title        = {Robustness verification of soft security systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102632},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102632},
  doi          = {10.1016/J.JISA.2020.102632},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Bidgoly20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BouakkazS20,
  author       = {Samra Bouakkaz and
                  Fouzi Semchedine},
  title        = {A certificateless ring signature scheme with batch verification for
                  applications in {VANET}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102669},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102669},
  doi          = {10.1016/J.JISA.2020.102669},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BouakkazS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CalderoniBM20,
  author       = {Luca Calderoni and
                  Samantha Bandini and
                  Dario Maio},
  title        = {Privacy preservation in outsourced mobility traces through compact
                  data structures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102630},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102630},
  doi          = {10.1016/J.JISA.2020.102630},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CalderoniBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChSGMB20,
  author       = {Rupa Ch. and
                  Gautam Srivastava and
                  Thippa Reddy Gadekallu and
                  Praveen Kumar Reddy Maddikunta and
                  Sweta Bhattacharya},
  title        = {Security and privacy of {UAV} data using blockchain technology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102670},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102670},
  doi          = {10.1016/J.JISA.2020.102670},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChSGMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenCMTLR20,
  author       = {Zhanwen Chen and
                  Jiageng Chen and
                  Weizhi Meng and
                  Je Sen Teh and
                  Pei Li and
                  Bingqing Ren},
  title        = {Analysis of differential distribution of lightweight block cipher
                  based on parallel processing on {GPU}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102565},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102565},
  doi          = {10.1016/J.JISA.2020.102565},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenCMTLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenLZH20,
  author       = {Bolin Chen and
                  Weiqi Luo and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Universal stego post-processing for enhancing image steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102664},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102664},
  doi          = {10.1016/J.JISA.2020.102664},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenLZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DaneshgarA20,
  author       = {Fatemeh Faraji Daneshgar and
                  Maghsoud Abbaspour},
  title        = {A two-phase sequential pattern mining framework to detect stealthy
                  {P2P} botnets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102645},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102645},
  doi          = {10.1016/J.JISA.2020.102645},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DaneshgarA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DavidT20,
  author       = {Jisa David and
                  Ciza Thomas},
  title        = {Detection of distributed denial of service attacks based on information
                  theoretic approach in time series models},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102621},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102621},
  doi          = {10.1016/J.JISA.2020.102621},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DavidT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FeronLL20,
  author       = {Cyrielle Feron and
                  Lo{\"{\i}}c Lagadec and
                  Vianney Lap{\^{o}}tre},
  title        = {Automated exploration of homomorphic encryption scheme input parameters},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102627},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102627},
  doi          = {10.1016/J.JISA.2020.102627},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FeronLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FranciaGGS20,
  author       = {Matteo Francia and
                  Enrico Gallinucci and
                  Matteo Golfarelli and
                  Nicola Santolini},
  title        = {{DART:} De-Anonymization of personal gazetteers through social trajectories},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102634},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102634},
  doi          = {10.1016/J.JISA.2020.102634},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FranciaGGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoHSLNX20,
  author       = {Xianwei Gao and
                  Changzhen Hu and
                  Chun Shan and
                  Baoxu Liu and
                  Zequn Niu and
                  Hui Xie},
  title        = {Malware classification for the cloud via semi-supervised transfer
                  learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102661},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102661},
  doi          = {10.1016/J.JISA.2020.102661},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoHSLNX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GodquinBGGB20,
  author       = {Tanguy Godquin and
                  Morgan Barbier and
                  Chrystel Gaber and
                  Jean{-}Luc Grimault and
                  Jean{-}Marie Le Bars},
  title        = {Applied graph theory to security: {A} qualitative placement of security
                  solutions within IoT networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102640},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102640},
  doi          = {10.1016/J.JISA.2020.102640},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GodquinBGGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HaqWZM20,
  author       = {Inam ul Haq and
                  Jian Wang and
                  Youwen Zhu and
                  Saad Maqbool},
  title        = {A survey of authenticated key agreement protocols for multi-server
                  architecture},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102639},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102639},
  doi          = {10.1016/J.JISA.2020.102639},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HaqWZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kaur20,
  author       = {Gagandeep Kaur},
  title        = {A comparison of two hybrid ensemble techniques for network anomaly
                  detection in spark distributed environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102601},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102601},
  doi          = {10.1016/J.JISA.2020.102601},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Kaur20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhattakTAADA20,
  author       = {Hasan Ali Khattak and
                  Komal Tehreem and
                  Ahmad Almogren and
                  Zoobia Ameer and
                  Ikram Ud Din and
                  Muhammad Adnan},
  title        = {Dynamic pricing in industrial internet of things: Blockchain application
                  for energy management in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102615},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102615},
  doi          = {10.1016/J.JISA.2020.102615},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhattakTAADA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KoCB20,
  author       = {Ili Ko and
                  Desmond Chambers and
                  Enda Barrett},
  title        = {Adaptable feature-selecting and threshold-moving complete autoencoder
                  for DDoS flood attack mitigation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102647},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102647},
  doi          = {10.1016/J.JISA.2020.102647},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KoCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KokAJ20,
  author       = {S. H. Kok and
                  Azween B. Abdullah and
                  N. Z. Jhanjhi},
  title        = {Evaluation metric for crypto-ransomware detection using machine learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102646},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102646},
  doi          = {10.1016/J.JISA.2020.102646},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KokAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarSAK20,
  author       = {Ashish Kumar and
                  Rahul Saha and
                  Mamoun Alazab and
                  Gulshan Kumar},
  title        = {A Lightweight Signcryption Method for Perception Layer in Internet-of-Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102662},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102662},
  doi          = {10.1016/J.JISA.2020.102662},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KumarSAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LawrenceACL20,
  author       = {Tandoh Lawrence and
                  Ikram Ali and
                  Tandoh Christopher and
                  Fagen Li},
  title        = {A bandwidth efficient HMAC-based authentication scheme for network
                  coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102658},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102658},
  doi          = {10.1016/J.JISA.2020.102658},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LawrenceACL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiWLX20,
  author       = {Wenjuan Li and
                  Yu Wang and
                  Jin Li and
                  Yang Xiang},
  title        = {Toward supervised shape-based behavioral authentication on smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102591},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102591},
  doi          = {10.1016/J.JISA.2020.102591},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiWLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaFF20,
  author       = {Mimi Ma and
                  Shuqin Fan and
                  Dengguo Feng},
  title        = {Multi-user certificateless public key encryption with conjunctive
                  keyword search for cloud-based telemedicine},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102652},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102652},
  doi          = {10.1016/J.JISA.2020.102652},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MaFF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mandal20,
  author       = {Mriganka Mandal},
  title        = {Privacy-preserving fully anonymous ciphertext policy attribute-based
                  broadcast encryption with constant-size secret keys and fast decryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102666},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102666},
  doi          = {10.1016/J.JISA.2020.102666},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Mandal20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MasmoudiMSAB20,
  author       = {Fatma Masmoudi and
                  Zakaria Maamar and
                  Mohamed Sellami and
                  Ali Ismail Awad and
                  Vanilson Arruda Bur{\'{e}}gio},
  title        = {A Guiding Framework for Vetting the Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102644},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102644},
  doi          = {10.1016/J.JISA.2020.102644},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MasmoudiMSAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraDYRVK20,
  author       = {Dheerendra Mishra and
                  Dharminder Dharminder and
                  Preeti Yadav and
                  Y. Sreenivasa Rao and
                  Pandi Vijayakumar and
                  Neeraj Kumar},
  title        = {A provably secure dynamic ID-based authenticated key agreement framework
                  for mobile edge computing without a trusted party},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102648},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102648},
  doi          = {10.1016/J.JISA.2020.102648},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MishraDYRVK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MoussailebNC20,
  author       = {Routa Moussaileb and
                  Renzo E. Navas and
                  Nora Cuppens},
  title        = {Watch out! Doxware on the way..},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102668},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102668},
  doi          = {10.1016/J.JISA.2020.102668},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MoussailebNC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NejadMH20,
  author       = {Mohsen Yoosefi Nejad and
                  Mohammad Mosleh and
                  Saeed Rasouli Heikalabad},
  title        = {A blind quantum audio watermarking based on quantum discrete cosine
                  transform},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102495},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102495},
  doi          = {10.1016/J.JISA.2020.102495},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NejadMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatelTGK20,
  author       = {Mohil Maheshkumar Patel and
                  Sudeep Tanwar and
                  Rajesh Gupta and
                  Neeraj Kumar},
  title        = {A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial
                  Institutions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102583},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102583},
  doi          = {10.1016/J.JISA.2020.102583},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PatelTGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RaghuvanshiKK20,
  author       = {Kamlesh Kumar Raghuvanshi and
                  Subodh Kumar and
                  Sunil Kumar},
  title        = {A data encryption model based on intertwining logistic map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102622},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102622},
  doi          = {10.1016/J.JISA.2020.102622},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RaghuvanshiKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RawatD20,
  author       = {Arjun Rawat and
                  Maroti Deshmukh},
  title        = {Tree and elliptic curve based efficient and secure group key agreement
                  protocol},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102599},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102599},
  doi          = {10.1016/J.JISA.2020.102599},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RawatD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RoyGRDC20,
  author       = {Satyabrata Roy and
                  Rohit Kumar Gupta and
                  Umashankar Rawat and
                  Nilanjan Dey and
                  Rub{\'{e}}n Gonz{\'{a}}lez Crespo},
  title        = {{PCHET:} An efficient programmable cellular automata based hybrid
                  encryption technique for multi-chat client-server applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102624},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102624},
  doi          = {10.1016/J.JISA.2020.102624},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RoyGRDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RtayliE20,
  author       = {Naoufal Rtayli and
                  Nourddine Enneya},
  title        = {Enhanced credit card fraud detection based on SVM-recursive feature
                  elimination and hyper-parameters optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102596},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102596},
  doi          = {10.1016/J.JISA.2020.102596},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RtayliE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahaRK20,
  author       = {Tushar Kanti Saha and
                  Deevashwer Rathee and
                  Takeshi Koshiba},
  title        = {Efficient protocols for private wildcards pattern matching},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102609},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102609},
  doi          = {10.1016/J.JISA.2020.102609},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SahaRK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SangaviT20,
  author       = {V. Sangavi and
                  P. Thangavel},
  title        = {An exotic multi-dimensional conceptualization for medical image encryption
                  exerting Rossler system and Sine map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102626},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102626},
  doi          = {10.1016/J.JISA.2020.102626},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SangaviT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SenM20,
  author       = {Amartya Sen and
                  Sanjay Madria},
  title        = {Application design phase risk assessment framework using cloud security
                  domains},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102617},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102617},
  doi          = {10.1016/J.JISA.2020.102617},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SenM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShamshadRMKC20,
  author       = {Salman Shamshad and
                  Minahil Rana and
                  Khalid Mahmood and
                  Saru Kumari and
                  Chien{-}Ming Chen},
  title        = {A secure blockchain-based e-health records storage and sharing scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102590},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102590},
  doi          = {10.1016/J.JISA.2020.102590},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ShamshadRMKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShamshirbandFCM20,
  author       = {Shahab Shamshirband and
                  Mahdis Fathi and
                  Anthony T. Chronopoulos and
                  Antonio Montieri and
                  Fabio Palumbo and
                  Antonio Pescap{\`{e}}},
  title        = {Computational intelligence intrusion detection techniques in mobile
                  cloud computing environments: Review, taxonomy, and open research
                  issues},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102582},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102582},
  doi          = {10.1016/J.JISA.2020.102582},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShamshirbandFCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghKGSKS20,
  author       = {Indu Singh and
                  Narendra Kumar and
                  Srinivasa K. G. and
                  Tript Sharma and
                  Vaibhav Kumar and
                  Siddharth Singhal},
  title        = {Database intrusion detection using role and user behavior based risk
                  assessment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102654},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102654},
  doi          = {10.1016/J.JISA.2020.102654},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghKGSKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SleemNC20,
  author       = {Lama Sleem and
                  Hassan N. Noura and
                  Rapha{\"{e}}l Couturier},
  title        = {Towards a secure {ITS:} Overview, challenges and solutions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102637},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102637},
  doi          = {10.1016/J.JISA.2020.102637},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SleemNC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SouzaCBH20,
  author       = {Nivio Paula de Souza and
                  Cec{\'{\i}}lia de Azevedo Castro C{\'{e}}sar and
                  Juliana de Melo Bezerra and
                  Celso Massaki Hirata},
  title        = {Extending {STPA} with {STRIDE} to identify cybersecurity loss scenarios},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102620},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102620},
  doi          = {10.1016/J.JISA.2020.102620},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SouzaCBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TaoCZ20,
  author       = {Ye Tao and
                  Wenhua Cui and
                  Zhao Zhang},
  title        = {Spatiotemporal chaos in multiple dynamically coupled map lattices
                  and its application in a novel image encryption algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102650},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102650},
  doi          = {10.1016/J.JISA.2020.102650},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TaoCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangML20,
  author       = {Xiao{-}di Wang and
                  Weizhi Meng and
                  Yi{-}Ning Liu},
  title        = {Lightweight privacy-preserving data aggregation protocol against internal
                  attacks in smart grid},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102628},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102628},
  doi          = {10.1016/J.JISA.2020.102628},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Wicker20,
  author       = {Stephen B. Wicker},
  title        = {eBook surveillance and the threat to freedom of association},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102643},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102643},
  doi          = {10.1016/J.JISA.2020.102643},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Wicker20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiongLLCN20,
  author       = {Xingxing Xiong and
                  Shubo Liu and
                  Dan Li and
                  Zhaohui Cai and
                  Xiaoguang Niu},
  title        = {Real-time and private spatio-temporal data aggregation with local
                  differential privacy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102633},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102633},
  doi          = {10.1016/J.JISA.2020.102633},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiongLLCN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLL20,
  author       = {Ching{-}Nung Yang and
                  Yi{-}Chin Lin and
                  Peng Li},
  title        = {Cheating immune \emph{k}-out-of-\emph{n} block-based progressive visual
                  cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102660},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102660},
  doi          = {10.1016/J.JISA.2020.102660},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuL20,
  author       = {Huifang Yu and
                  Wen Li},
  title        = {A certificateless signature for multi-source network coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102655},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102655},
  doi          = {10.1016/J.JISA.2020.102655},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangCLJC20,
  author       = {Hongxia Zhang and
                  Xingshu Chen and
                  Xiao Lan and
                  Hongjian Jin and
                  Qi Cao},
  title        = {{BTCAS:} {A} Blockchain-Based Thoroughly Cross-Domain Authentication
                  Scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102538},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102538},
  doi          = {10.1016/J.JISA.2020.102538},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangCLJC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangTSS20,
  author       = {Jing Zhang and
                  Rong Tan and
                  Chunhua Su and
                  Wen Si},
  title        = {Design and application of a personal credit information sharing platform
                  based on consortium blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102659},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102659},
  doi          = {10.1016/J.JISA.2020.102659},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangTSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouHWCC20,
  author       = {Xiaoyu Zhou and
                  Wien Hong and
                  Shaowei Weng and
                  Tung{-}Shou Chen and
                  Jeanne Chen},
  title        = {Reversible and recoverable authentication method for demosaiced images
                  using adaptive coding technique},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102629},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102629},
  doi          = {10.1016/J.JISA.2020.102629},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouHWCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics