Search dblp for Publications

export results for "toc:db/journals/istr/istr74.bht:"

 download as .bib file

@article{DBLP:journals/istr/AddobeaLOH23,
  author       = {Abigail Akosua Addobea and
                  Qianmu Li and
                  Isaac Amankona Obiri and
                  Jun Hou},
  title        = {Secure multi-factor access control mechanism for pairing blockchains},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103477},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103477},
  doi          = {10.1016/J.JISA.2023.103477},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AddobeaLOH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlaeiyanPP23,
  author       = {Mohammadhadi Alaeiyan and
                  Saeed Parsa and
                  Vinod P.},
  title        = {Sober: Explores for invasive behaviour of malware},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103451},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103451},
  doi          = {10.1016/J.JISA.2023.103451},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AlaeiyanPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AntwiBoasiakoZLD23,
  author       = {Emmanuel Antwi{-}Boasiako and
                  Shijie Zhou and
                  Yongjian Liao and
                  Yingjie Dong},
  title        = {Privacy-preserving distributed deep learning via LWE-based Certificateless
                  Additively Homomorphic Encryption {(CAHE)}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103462},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103462},
  doi          = {10.1016/J.JISA.2023.103462},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AntwiBoasiakoZLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BuccafurriAL23,
  author       = {Francesco Buccafurri and
                  Vincenzo De Angelis and
                  Sara Lazzaro},
  title        = {Enabling anonymized open-data linkage by authorized parties},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103478},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103478},
  doi          = {10.1016/J.JISA.2023.103478},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BuccafurriAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChangLL23,
  author       = {Yuan Chang and
                  Jiliang Li and
                  Wenjuan Li},
  title        = {2D2PS: {A} demand-driven privacy-preserving scheme for anonymous data
                  sharing in smart grids},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103466},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103466},
  doi          = {10.1016/J.JISA.2023.103466},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChangLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChanuSC23,
  author       = {Usham Sanjota Chanu and
                  Khundrakpam Johnson Singh and
                  Yambem Jina Chanu},
  title        = {A dynamic feature selection technique to detect DDoS attack},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103445},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103445},
  doi          = {10.1016/J.JISA.2023.103445},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChanuSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChaoHL23,
  author       = {Jedrik Chao and
                  Md. Shafaeat Hossain and
                  Lisa Lancor},
  title        = {Swipe gestures for user authentication in smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103450},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103450},
  doi          = {10.1016/J.JISA.2023.103450},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChaoHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuyKHHP23,
  author       = {Phan The Duy and
                  Nghi Hoang Khoa and
                  Do Thi Thu Hien and
                  Hien Do Hoang and
                  Van{-}Hau Pham},
  title        = {Investigating on the robustness of flow-based intrusion detection
                  system against adversarial samples using Generative Adversarial Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103472},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103472},
  doi          = {10.1016/J.JISA.2023.103472},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DuyKHHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuB23,
  author       = {Yuhao Gu and
                  Yuebin Bai},
  title        = {{LDIA:} Label distribution inference attack against federated learning
                  in edge computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103475},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103475},
  doi          = {10.1016/J.JISA.2023.103475},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HanZJWLR23,
  author       = {Pengchong Han and
                  Zhouyang Zhang and
                  Shan Ji and
                  Xiaowan Wang and
                  Liang Liu and
                  Yongjun Ren},
  title        = {Access control mechanism for the Internet of Things based on blockchain
                  and inner product encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103446},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103446},
  doi          = {10.1016/J.JISA.2023.103446},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HanZJWLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HeXDZS23,
  author       = {Yuan He and
                  Chang{-}you Xing and
                  Ke Ding and
                  Guomin Zhang and
                  Lihua Song},
  title        = {A differential privacy based multi-stage network fingerprinting deception
                  game method},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103460},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103460},
  doi          = {10.1016/J.JISA.2023.103460},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HeXDZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiFQ23,
  author       = {Yingjie Li and
                  Yan Feng and
                  Quan Qian},
  title        = {FDPBoost: Federated differential privacy gradient boosting decision
                  trees},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103468},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103468},
  doi          = {10.1016/J.JISA.2023.103468},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiFQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLGW23,
  author       = {Xuelian Li and
                  Hui Li and
                  Juntao Gao and
                  Runsong Wang},
  title        = {Privacy preserving via multi-key homomorphic encryption in cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103463},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103463},
  doi          = {10.1016/J.JISA.2023.103463},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuRCL23,
  author       = {Jiashuo Liu and
                  Jiongjiong Ren and
                  Shaozhen Chen and
                  ManMan Li},
  title        = {Improved neural distinguishers with multi-round and multi-splicing
                  construction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103461},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103461},
  doi          = {10.1016/J.JISA.2023.103461},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuRCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LuyenSP23,
  author       = {Cao Thi Luyen and
                  Nguyen Kim Sao and
                  At PhamVan},
  title        = {Dual-image reversible data hiding method using maximum embedding ability
                  of each pixel},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103470},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103470},
  doi          = {10.1016/J.JISA.2023.103470},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LuyenSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MeiLFZ23,
  author       = {Huan Mei and
                  Guanjun Lin and
                  Da Fang and
                  Jun Zhang},
  title        = {Detecting vulnerabilities in IoT software: New hybrid model and comprehensive
                  data analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103467},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103467},
  doi          = {10.1016/J.JISA.2023.103467},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MeiLFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShawkyUFIAAT23,
  author       = {Mahmoud A. Shawky and
                  Muhammad Usman and
                  David Flynn and
                  Muhammad Ali Imran and
                  Qammer H. Abbasi and
                  Shuja Ansari and
                  Ahmad Taha},
  title        = {Blockchain-based secret key extraction for efficient and secure authentication
                  in VANETs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103476},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103476},
  doi          = {10.1016/J.JISA.2023.103476},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShawkyUFIAAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SrivastavaDTS23,
  author       = {Vikas Srivastava and
                  Sumit Kumar Debnath and
                  Sharwan K. Tiwari and
                  Harshdeep Singh},
  title        = {On the security of multivariate-based ring signature and other related
                  primitives},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103474},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103474},
  doi          = {10.1016/J.JISA.2023.103474},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SrivastavaDTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TianGJLY23,
  author       = {Pengxu Tian and
                  Cheng Guo and
                  Yingmo Jie and
                  Yining Liu and
                  Lin Yao},
  title        = {Scan-free verifiable public-key searchable encryption supporting efficient
                  user updates in distributed systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103471},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103471},
  doi          = {10.1016/J.JISA.2023.103471},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TianGJLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangWZD23,
  author       = {Junxin Wang and
                  Shangping Wang and
                  Qian Zhang and
                  Yinjuan Deng},
  title        = {A two-layer consortium blockchain with transaction privacy protection
                  based on sharding technology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103452},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103452},
  doi          = {10.1016/J.JISA.2023.103452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangWZD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuG23,
  author       = {Zhijun Wu and
                  Junjun Guo},
  title        = {{MFPD-LSTM:} {A} steganalysis method based on multiple features of
                  pitch delay using {RNN-LSTM}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103469},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103469},
  doi          = {10.1016/J.JISA.2023.103469},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuLW23,
  author       = {Huifang Yu and
                  Junze Liu and
                  Zhicang Wang},
  title        = {Certificateless multi-source elliptic curve ring signcryption for
                  cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103449},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103449},
  doi          = {10.1016/J.JISA.2023.103449},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics