default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2023
- Muqadar Ali, Hongjie He, Abid Hussain, Mehboob Hussain, Yuan Yuan:
Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing. J. Inf. Secur. Appl. 75: 103500 (2023) - Jatin Arora, Ketti Ramchandran Ramkumar, Sathiyaraj R, G. S. Pradeep Ghantasala:
Securing web documents by using piggybacked framework based on Newton's forward interpolation method. J. Inf. Secur. Appl. 75: 103498 (2023) - Sourav Bera, Suryakant Prasad, Y. Sreenivasa Rao, Ashok Kumar Das, Youngho Park:
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment. J. Inf. Secur. Appl. 75: 103482 (2023) - Wen Chang, Zhen-Zhen Li, Fu-Cheng You, Xing-Bo Pan:
Dynamic quantum fully homomorphic encryption scheme based on universal quantum circuit. J. Inf. Secur. Appl. 75: 103510 (2023) - Jiaqi Chen, Chong Yuan, Jiashuo Li, Donghai Tian, Rui Ma, Xiaoqi Jia:
ELAMD: An ensemble learning framework for adversarial malware defense. J. Inf. Secur. Appl. 75: 103508 (2023) - Sabarathinam Chockalingam, Wolter Pieters, André M. H. Teixeira, Pieter H. A. J. M. van Gelder:
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures. J. Inf. Secur. Appl. 75: 103497 (2023) - Hui Cui, Zhiguo Wan, Huayi Qi, Baodong Qin, Xun Yi:
Password-authenticated proofs of retrievability for multiple devices checking cloud data. J. Inf. Secur. Appl. 75: 103480 (2023) - Priyabrata Dash, Fagul Pandey, Monalisa Sarma, Debasis Samanta:
Efficient private key generation from iris data for privacy and security applications. J. Inf. Secur. Appl. 75: 103506 (2023) - Ruizhong Du, Na Liu, Mingyue Li, Junfeng Tian:
Block verifiable dynamic searchable encryption using redactable blockchain. J. Inf. Secur. Appl. 75: 103504 (2023) - Edlira Dushku, Md Masoom Rabbani, Jo Vliegen, An Braeken, Nele Mentens:
PROVE: Provable remote attestation for public verifiability. J. Inf. Secur. Appl. 75: 103448 (2023) - Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
AIM: An Android Interpretable Malware detector based on application class modeling. J. Inf. Secur. Appl. 75: 103486 (2023) - Shuitao Guo, Shijie Zhu, Changqing Zhu, Na Ren, Wei Tang, Dingjie Xu:
A robust and lossless commutative encryption and watermarking algorithm for vector geographic data. J. Inf. Secur. Appl. 75: 103503 (2023) - Xin Hou, Xiaofeng Jia, Jun Shao:
Public key encryption with public-verifiable decryption delegation and its application. J. Inf. Secur. Appl. 75: 103513 (2023) - Masahito Ishizaka, Kazuhide Fukushima:
Wildcarded identity-based ring signatures based on linearly homomorphic signatures. J. Inf. Secur. Appl. 75: 103499 (2023) - Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong, Shuang Bao, Lanlan Wang:
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme. J. Inf. Secur. Appl. 75: 103487 (2023) - Pengcheng Luo, Jian Chu, Genke Yang:
IP packet-level encrypted traffic classification using machine learning with a light weight feature engineering method. J. Inf. Secur. Appl. 75: 103519 (2023) - Zhaorui Ma, Shicheng Zhang, Xinhao Hu, Na Li, Qinglei Zhou, Fenlin Liu, Hongjian Wang, Guangwu Hu, Qilin Dong:
GWS-Geo: A graph neural network based model for street-level IPv6 geolocation. J. Inf. Secur. Appl. 75: 103511 (2023) - Zamineh Najafi, Shahram Babaie:
A lightweight hierarchical key management approach for internet of things. J. Inf. Secur. Appl. 75: 103485 (2023) - Roberto De Prisco, Alfredo De Santis, Delfina Malandrino, Rocco Zaccagnino:
An improved privacy attack on smartphones exploiting the accelerometer. J. Inf. Secur. Appl. 75: 103479 (2023) - Purva Rewal, Mrityunjay Singh, Dheerendra Mishra, Komal Pursharthi, Ankita Mishra:
Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices. J. Inf. Secur. Appl. 75: 103505 (2023) - Johannes Schneider, Giovanni Apruzzese:
Dual adversarial attacks: Fooling humans and classifiers. J. Inf. Secur. Appl. 75: 103502 (2023) - Xiaofeng Shen, Heng Yao, Shunquan Tan, Chuan Qin:
VHNet: A Video Hiding Network with robustness to video coding. J. Inf. Secur. Appl. 75: 103515 (2023) - Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Yaofei Wang:
Robust audio copy-move forgery detection on short forged slices using sliding window. J. Inf. Secur. Appl. 75: 103507 (2023) - Ana Paula Vazão, Leonel Santos, Rogério Luís C. Costa, Carlos Rabadão:
Implementing and evaluating a GDPR-compliant open-source SIEM solution. J. Inf. Secur. Appl. 75: 103509 (2023) - Nai Wang, Junjun Chen, Di Wu, Wencheng Yang, Yong Xiang, Atul Sajjanhar:
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things. J. Inf. Secur. Appl. 75: 103483 (2023) - Yihao Wang, Ru Zhang, Jianyi Liu:
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length. J. Inf. Secur. Appl. 75: 103512 (2023) - Xiaotian Wu, Ching-Nung Yang, Hong-Wu Cai, Yanxiao Liu:
A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding. J. Inf. Secur. Appl. 75: 103520 (2023) - Ming Xia, Jiyou Chen, Gaobo Yang, Shuai Wang:
Robust detection of seam carving with low ratio via pixel adjacency subtraction and CNN-based transfer learning. J. Inf. Secur. Appl. 75: 103522 (2023) - Huifang Yu, Wenxuan Hui:
Certificateless ring signature from NTRU lattice for electronic voting. J. Inf. Secur. Appl. 75: 103496 (2023) - Patricio Zambrano, Jenny Torres, Luis Tello-Oquendo, Ángel Yánez, Luis Velásquez:
On the modeling of cyber-attacks associated with social engineering: A parental control prototype. J. Inf. Secur. Appl. 75: 103501 (2023)
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-09 05:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint