Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr55.bht:"
@article{DBLP:journals/istr/AlEroudAAA20, author = {Ahmed Aleroud and Emad Abu{-}Shanab and Ahmad Al{-}Aiad and Yazan Alshboul}, title = {An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102614}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102614}, doi = {10.1016/J.JISA.2020.102614}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AlEroudAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlhadawiLZA20, author = {Hussam S. Alhadawi and Dragan Lambic and Mohamad Fadli Zolkipli and Musheer Ahmad}, title = {Globalized firefly algorithm and chaos for designing substitution box}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102671}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102671}, doi = {10.1016/J.JISA.2020.102671}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlhadawiLZA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AyebieS20, author = {Edoukou Berenger Ayebie and El Mamoun Souidi}, title = {Rank-metric code-based mutual authentication protocol for {RFID}}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102598}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102598}, doi = {10.1016/J.JISA.2020.102598}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AyebieS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AyubSAMK20, author = {Muhammad Faizan Ayub and Muhammad Asad Saleem and Izwa Altaf and Khalid Mahmood and Saru Kumari}, title = {Fuzzy extraction and {PUF} based three party authentication protocol using {USB} as mass storage device}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102585}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102585}, doi = {10.1016/J.JISA.2020.102585}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AyubSAMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BabaghayouLALF20, author = {Messaoud Babaghayou and Nabila Labraoui and Ado Adamou Abba Ari and Nasreddine Lagraa and Mohamed Amine Ferrag}, title = {Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: {A} survey}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102618}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102618}, doi = {10.1016/J.JISA.2020.102618}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BabaghayouLALF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bidgoly20, author = {Amir Jalaly Bidgoly}, title = {Robustness verification of soft security systems}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102632}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102632}, doi = {10.1016/J.JISA.2020.102632}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Bidgoly20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BouakkazS20, author = {Samra Bouakkaz and Fouzi Semchedine}, title = {A certificateless ring signature scheme with batch verification for applications in {VANET}}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102669}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102669}, doi = {10.1016/J.JISA.2020.102669}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BouakkazS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CalderoniBM20, author = {Luca Calderoni and Samantha Bandini and Dario Maio}, title = {Privacy preservation in outsourced mobility traces through compact data structures}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102630}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102630}, doi = {10.1016/J.JISA.2020.102630}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CalderoniBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChSGMB20, author = {Rupa Ch. and Gautam Srivastava and Thippa Reddy Gadekallu and Praveen Kumar Reddy Maddikunta and Sweta Bhattacharya}, title = {Security and privacy of {UAV} data using blockchain technology}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102670}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102670}, doi = {10.1016/J.JISA.2020.102670}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChSGMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenCMTLR20, author = {Zhanwen Chen and Jiageng Chen and Weizhi Meng and Je Sen Teh and Pei Li and Bingqing Ren}, title = {Analysis of differential distribution of lightweight block cipher based on parallel processing on {GPU}}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102565}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102565}, doi = {10.1016/J.JISA.2020.102565}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenCMTLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenLZH20, author = {Bolin Chen and Weiqi Luo and Peijia Zheng and Jiwu Huang}, title = {Universal stego post-processing for enhancing image steganography}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102664}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102664}, doi = {10.1016/J.JISA.2020.102664}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenLZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DaneshgarA20, author = {Fatemeh Faraji Daneshgar and Maghsoud Abbaspour}, title = {A two-phase sequential pattern mining framework to detect stealthy {P2P} botnets}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102645}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102645}, doi = {10.1016/J.JISA.2020.102645}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DaneshgarA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DavidT20, author = {Jisa David and Ciza Thomas}, title = {Detection of distributed denial of service attacks based on information theoretic approach in time series models}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102621}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102621}, doi = {10.1016/J.JISA.2020.102621}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DavidT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FeronLL20, author = {Cyrielle Feron and Lo{\"{\i}}c Lagadec and Vianney Lap{\^{o}}tre}, title = {Automated exploration of homomorphic encryption scheme input parameters}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102627}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102627}, doi = {10.1016/J.JISA.2020.102627}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FeronLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FranciaGGS20, author = {Matteo Francia and Enrico Gallinucci and Matteo Golfarelli and Nicola Santolini}, title = {{DART:} De-Anonymization of personal gazetteers through social trajectories}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102634}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102634}, doi = {10.1016/J.JISA.2020.102634}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FranciaGGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoHSLNX20, author = {Xianwei Gao and Changzhen Hu and Chun Shan and Baoxu Liu and Zequn Niu and Hui Xie}, title = {Malware classification for the cloud via semi-supervised transfer learning}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102661}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102661}, doi = {10.1016/J.JISA.2020.102661}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoHSLNX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GodquinBGGB20, author = {Tanguy Godquin and Morgan Barbier and Chrystel Gaber and Jean{-}Luc Grimault and Jean{-}Marie Le Bars}, title = {Applied graph theory to security: {A} qualitative placement of security solutions within IoT networks}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102640}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102640}, doi = {10.1016/J.JISA.2020.102640}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GodquinBGGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HaqWZM20, author = {Inam ul Haq and Jian Wang and Youwen Zhu and Saad Maqbool}, title = {A survey of authenticated key agreement protocols for multi-server architecture}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102639}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102639}, doi = {10.1016/J.JISA.2020.102639}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HaqWZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kaur20, author = {Gagandeep Kaur}, title = {A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102601}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102601}, doi = {10.1016/J.JISA.2020.102601}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Kaur20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhattakTAADA20, author = {Hasan Ali Khattak and Komal Tehreem and Ahmad Almogren and Zoobia Ameer and Ikram Ud Din and Muhammad Adnan}, title = {Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102615}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102615}, doi = {10.1016/J.JISA.2020.102615}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhattakTAADA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KoCB20, author = {Ili Ko and Desmond Chambers and Enda Barrett}, title = {Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102647}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102647}, doi = {10.1016/J.JISA.2020.102647}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KoCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KokAJ20, author = {S. H. Kok and Azween B. Abdullah and N. Z. Jhanjhi}, title = {Evaluation metric for crypto-ransomware detection using machine learning}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102646}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102646}, doi = {10.1016/J.JISA.2020.102646}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KokAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarSAK20, author = {Ashish Kumar and Rahul Saha and Mamoun Alazab and Gulshan Kumar}, title = {A Lightweight Signcryption Method for Perception Layer in Internet-of-Things}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102662}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102662}, doi = {10.1016/J.JISA.2020.102662}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KumarSAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LawrenceACL20, author = {Tandoh Lawrence and Ikram Ali and Tandoh Christopher and Fagen Li}, title = {A bandwidth efficient HMAC-based authentication scheme for network coding}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102658}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102658}, doi = {10.1016/J.JISA.2020.102658}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LawrenceACL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiWLX20, author = {Wenjuan Li and Yu Wang and Jin Li and Yang Xiang}, title = {Toward supervised shape-based behavioral authentication on smartphones}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102591}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102591}, doi = {10.1016/J.JISA.2020.102591}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiWLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaFF20, author = {Mimi Ma and Shuqin Fan and Dengguo Feng}, title = {Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102652}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102652}, doi = {10.1016/J.JISA.2020.102652}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MaFF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mandal20, author = {Mriganka Mandal}, title = {Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102666}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102666}, doi = {10.1016/J.JISA.2020.102666}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Mandal20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MasmoudiMSAB20, author = {Fatma Masmoudi and Zakaria Maamar and Mohamed Sellami and Ali Ismail Awad and Vanilson Arruda Bur{\'{e}}gio}, title = {A Guiding Framework for Vetting the Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102644}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102644}, doi = {10.1016/J.JISA.2020.102644}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MasmoudiMSAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraDYRVK20, author = {Dheerendra Mishra and Dharminder Dharminder and Preeti Yadav and Y. Sreenivasa Rao and Pandi Vijayakumar and Neeraj Kumar}, title = {A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102648}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102648}, doi = {10.1016/J.JISA.2020.102648}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MishraDYRVK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MoussailebNC20, author = {Routa Moussaileb and Renzo E. Navas and Nora Cuppens}, title = {Watch out! Doxware on the way..}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102668}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102668}, doi = {10.1016/J.JISA.2020.102668}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MoussailebNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NejadMH20, author = {Mohsen Yoosefi Nejad and Mohammad Mosleh and Saeed Rasouli Heikalabad}, title = {A blind quantum audio watermarking based on quantum discrete cosine transform}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102495}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102495}, doi = {10.1016/J.JISA.2020.102495}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NejadMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatelTGK20, author = {Mohil Maheshkumar Patel and Sudeep Tanwar and Rajesh Gupta and Neeraj Kumar}, title = {A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102583}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102583}, doi = {10.1016/J.JISA.2020.102583}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PatelTGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RaghuvanshiKK20, author = {Kamlesh Kumar Raghuvanshi and Subodh Kumar and Sunil Kumar}, title = {A data encryption model based on intertwining logistic map}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102622}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102622}, doi = {10.1016/J.JISA.2020.102622}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RaghuvanshiKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RawatD20, author = {Arjun Rawat and Maroti Deshmukh}, title = {Tree and elliptic curve based efficient and secure group key agreement protocol}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102599}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102599}, doi = {10.1016/J.JISA.2020.102599}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RawatD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RoyGRDC20, author = {Satyabrata Roy and Rohit Kumar Gupta and Umashankar Rawat and Nilanjan Dey and Rub{\'{e}}n Gonz{\'{a}}lez Crespo}, title = {{PCHET:} An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102624}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102624}, doi = {10.1016/J.JISA.2020.102624}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RoyGRDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RtayliE20, author = {Naoufal Rtayli and Nourddine Enneya}, title = {Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102596}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102596}, doi = {10.1016/J.JISA.2020.102596}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RtayliE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SahaRK20, author = {Tushar Kanti Saha and Deevashwer Rathee and Takeshi Koshiba}, title = {Efficient protocols for private wildcards pattern matching}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102609}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102609}, doi = {10.1016/J.JISA.2020.102609}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SahaRK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SangaviT20, author = {V. Sangavi and P. Thangavel}, title = {An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler system and Sine map}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102626}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102626}, doi = {10.1016/J.JISA.2020.102626}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SangaviT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SenM20, author = {Amartya Sen and Sanjay Madria}, title = {Application design phase risk assessment framework using cloud security domains}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102617}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102617}, doi = {10.1016/J.JISA.2020.102617}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SenM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShamshadRMKC20, author = {Salman Shamshad and Minahil Rana and Khalid Mahmood and Saru Kumari and Chien{-}Ming Chen}, title = {A secure blockchain-based e-health records storage and sharing scheme}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102590}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102590}, doi = {10.1016/J.JISA.2020.102590}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ShamshadRMKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShamshirbandFCM20, author = {Shahab Shamshirband and Mahdis Fathi and Anthony T. Chronopoulos and Antonio Montieri and Fabio Palumbo and Antonio Pescap{\`{e}}}, title = {Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102582}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102582}, doi = {10.1016/J.JISA.2020.102582}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShamshirbandFCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghKGSKS20, author = {Indu Singh and Narendra Kumar and Srinivasa K. G. and Tript Sharma and Vaibhav Kumar and Siddharth Singhal}, title = {Database intrusion detection using role and user behavior based risk assessment}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102654}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102654}, doi = {10.1016/J.JISA.2020.102654}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghKGSKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SleemNC20, author = {Lama Sleem and Hassan N. Noura and Rapha{\"{e}}l Couturier}, title = {Towards a secure {ITS:} Overview, challenges and solutions}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102637}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102637}, doi = {10.1016/J.JISA.2020.102637}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SleemNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SouzaCBH20, author = {Nivio Paula de Souza and Cec{\'{\i}}lia de Azevedo Castro C{\'{e}}sar and Juliana de Melo Bezerra and Celso Massaki Hirata}, title = {Extending {STPA} with {STRIDE} to identify cybersecurity loss scenarios}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102620}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102620}, doi = {10.1016/J.JISA.2020.102620}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SouzaCBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TaoCZ20, author = {Ye Tao and Wenhua Cui and Zhao Zhang}, title = {Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102650}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102650}, doi = {10.1016/J.JISA.2020.102650}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TaoCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangML20, author = {Xiao{-}di Wang and Weizhi Meng and Yi{-}Ning Liu}, title = {Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102628}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102628}, doi = {10.1016/J.JISA.2020.102628}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Wicker20, author = {Stephen B. Wicker}, title = {eBook surveillance and the threat to freedom of association}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102643}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102643}, doi = {10.1016/J.JISA.2020.102643}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Wicker20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiongLLCN20, author = {Xingxing Xiong and Shubo Liu and Dan Li and Zhaohui Cai and Xiaoguang Niu}, title = {Real-time and private spatio-temporal data aggregation with local differential privacy}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102633}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102633}, doi = {10.1016/J.JISA.2020.102633}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XiongLLCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLL20, author = {Ching{-}Nung Yang and Yi{-}Chin Lin and Peng Li}, title = {Cheating immune \emph{k}-out-of-\emph{n} block-based progressive visual cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102660}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102660}, doi = {10.1016/J.JISA.2020.102660}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuL20, author = {Huifang Yu and Wen Li}, title = {A certificateless signature for multi-source network coding}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102655}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102655}, doi = {10.1016/J.JISA.2020.102655}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangCLJC20, author = {Hongxia Zhang and Xingshu Chen and Xiao Lan and Hongjian Jin and Qi Cao}, title = {{BTCAS:} {A} Blockchain-Based Thoroughly Cross-Domain Authentication Scheme}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102538}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102538}, doi = {10.1016/J.JISA.2020.102538}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangCLJC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangTSS20, author = {Jing Zhang and Rong Tan and Chunhua Su and Wen Si}, title = {Design and application of a personal credit information sharing platform based on consortium blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102659}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102659}, doi = {10.1016/J.JISA.2020.102659}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangTSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouHWCC20, author = {Xiaoyu Zhou and Wien Hong and Shaowei Weng and Tung{-}Shou Chen and Jeanne Chen}, title = {Reversible and recoverable authentication method for demosaiced images using adaptive coding technique}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102629}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102629}, doi = {10.1016/J.JISA.2020.102629}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhouHWCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.