default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2024
- Poopak Alaeifar, Shantanu Pal, Zahra Jadidi, Mukhtar Hussain, Ernest Foo:
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey. J. Inf. Secur. Appl. 83: 103786 (2024) - Moatsum Alawida:
A novel DNA tree-based chaotic image encryption algorithm. J. Inf. Secur. Appl. 83: 103791 (2024) - Giampaolo Bovenzi, Davide Di Monda, Antonio Montieri, Valerio Persico, Antonio Pescapè:
Classifying attack traffic in IoT environments via few-shot learning. J. Inf. Secur. Appl. 83: 103762 (2024) - Rongsheng Cai, Lanxiang Chen, Yizhao Zhu:
Using private set intersection to achieve privacy-preserving authorization for IoT systems. J. Inf. Secur. Appl. 83: 103759 (2024) - Hong-Bin Chen, Hsiang-Chun Hsu, Cang-Wei Huang, Justie Su-Tzu Juan:
An easy-to-implement construction for (k,n)-threshold progressive visual secret sharing schemes. J. Inf. Secur. Appl. 83: 103757 (2024) - Rui Chen, Yongcong Mou, Wei Li:
A provably secure multi-server authentication scheme based on Chebyshev chaotic map. J. Inf. Secur. Appl. 83: 103788 (2024) - Yanli Chen, Asad Malik, Hongxia Wang, Ben He, Yonghui Zhou, Hanzhou Wu:
Enhancing robustness in video data hiding against recompression with a wide parameter range. J. Inf. Secur. Appl. 83: 103796 (2024) - Venkata Bhikshapathi Chenam, Syed Taqi Ali:
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage. J. Inf. Secur. Appl. 83: 103801 (2024) - Chit-Jie Chew, Yu-Cheng Lin, Ying-Chin Chen, Yun-Yi Fan, Jung-San Lee:
Preserving manipulated and synthetic Deepfake detection through face texture naturalness. J. Inf. Secur. Appl. 83: 103798 (2024) - Nabeil Eltayieb, Rashad Elhabob, Yongjian Liao, Fagen Li, Shijie Zhou:
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application. J. Inf. Secur. Appl. 83: 103763 (2024) - Andrea Flamini, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi, Silvio Ranise:
On cryptographic mechanisms for the selective disclosure of verifiable credentials. J. Inf. Secur. Appl. 83: 103789 (2024) - Boli Hu, Kai Zhang, Junqing Gong, Lifei Wei, Jianting Ning:
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds. J. Inf. Secur. Appl. 83: 103783 (2024) - Yongqing Huang, Jin Gou, Zongwen Fan, Yongxin Liao, Yanmin Zhuang:
A multi-label network attack detection approach based on two-stage model fusion. J. Inf. Secur. Appl. 83: 103790 (2024) - Mashael M. Khayyat, Nuha Zamzami, Li Zhang, Michele Nappi, Muhammad Umer:
Fuzzy-CNN: Improving personal human identification based on IRIS recognition using LBP features. J. Inf. Secur. Appl. 83: 103761 (2024) - Gautam Kumar, Sambit Bakshi, Muhammad Attique Khan, Hussain Mobarak Albarakati:
Unraveling effects of ocular features on the performance of periocular biometrics. J. Inf. Secur. Appl. 83: 103772 (2024) - Vikas Kumar, Rohan Das, Aditi Kar Gangopadhyay:
GR-NTRU: Dihedral group over ring of Eisenstein integers. J. Inf. Secur. Appl. 83: 103795 (2024) - Dolendro Singh Laiphrakpam, Akash Lahoty, Chanubala Devi, Deepjoy Dey, Punyabrat Saikai, Khumukcham Sonam Devi, Motilal Singh Khoirom:
Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system. J. Inf. Secur. Appl. 83: 103793 (2024) - Mahima Mary Mathews, Panchami V:
QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks. J. Inf. Secur. Appl. 83: 103787 (2024) - Vagner Ereno Quincozes, Rodrigo Brandão Mansilha, Diego Kreutz, Charles Christian Miers, Roger Immich:
Auth4App: Streamlining authentication for integrated cyber-physical environments. J. Inf. Secur. Appl. 83: 103802 (2024) - George S. Rizos, Konstantinos A. Draziotis:
Cryptographic primitives based on compact knapsack problem. J. Inf. Secur. Appl. 83: 103781 (2024) - Emanuele Scala, Changyu Dong, Flavio Corradini, Leonardo Mostarda:
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain. J. Inf. Secur. Appl. 83: 103794 (2024) - Mohammadreza Shahlaei, Seyyed Mohsen Hashemi:
A risk-aware and recommender distributed intrusion detection system for home robots. J. Inf. Secur. Appl. 83: 103777 (2024) - Le Sun, Yiwen Hua, Ghulam Muhammad:
Biometric identity recognition based on contrastive positive-unlabeled learning. J. Inf. Secur. Appl. 83: 103780 (2024) - Towshik Anam Taj, Muhammad Iqbal Hossain:
A multi-level random key cryptosystem based on DNA encoding and state-changing mealy machine. J. Inf. Secur. Appl. 83: 103760 (2024) - Saher Tegane, Khaled Hamouid, Mawloud Omar, Fouzi Semchedine, Abdelmalek Boudries:
Corrigendum to "An extended Attribute-based access control with controlled delegation in IoT" [Journal of Information Systems and Applications 76 (2023) 103473]. J. Inf. Secur. Appl. 83: 103745 (2024) - Rong Wang, Junchuan Liang, Siyu Wang, Chin-Chen Chang:
A divide-and-conquer approach to privacy-preserving high-dimensional big data release. J. Inf. Secur. Appl. 83: 103756 (2024) - Fangwei Wang, Xipeng Shi, Fang Yang, Ruixin Song, Qingru Li, Zhiyuan Tan, Changguang Wang:
MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer. J. Inf. Secur. Appl. 83: 103784 (2024) - Taochun Wang, Nuo Xu, Qiong Zhang, Fulong Chen, Dong Xie, Chuanxin Zhao:
A lightweight privacy-preserving truth discovery in mobile crowdsensing systems. J. Inf. Secur. Appl. 83: 103792 (2024) - Xinyan Wu, Jin Li, Huanwei Wang, Xiaoguang Liu, Weifeng Wu, Fagen Li:
A randomized encryption deduplication method against frequency attack. J. Inf. Secur. Appl. 83: 103774 (2024) - Zhichao Xu, Hong Xu, Lin Tan, Wen-Feng Qi:
Linear cryptanalysis of SPECK and SPARX. J. Inf. Secur. Appl. 83: 103773 (2024)
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-25 03:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint