


default search action
Journal of Information Security and Applications, Volume 45
Volume 45, April 2019
- Guorong Xuan, Xiaolong Li, Yun-Qing Shi:

Minimum entropy and histogram-pair based JPEG image reversible data hiding. 1-9 - Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng

, Kouichi Sakurai:
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust. 10-19
- Fatma K. Tabash

, Muhammed Izharuddin, Mosab I. Tabash
:
Encryption techniques for H.264/AVC videos: A literature review. 20-34 - Avishek Kumar

, Naveen K. Nishchal
:
Quick response code and interference-based optical asymmetric cryptosystem. 35-43 - Badal Soni

, Pradip K. Das, Dalton Meitei Thounaojam
:
Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features. 44-51 - Hafsa Assidi, Edoukou Berenger Ayebie

, El Mamoun Souidi
:
An efficient code-based threshold ring signature scheme. 52-60 - Behrooz Khosravi

, Behnam Khosravi, Bahman Khosravi, Khashayar Nazarkardeh:
A new method for pdf steganography in justified texts. 61-70 - Ali Fatahbeygi, Fardin Akhlaghian Tab:

A highly robust and secure image watermarking based on classification and visual cryptography. 71-78 - Ruba AlOmari

, Julie Thorpe
:
On password behaviours and attitudes in different populations. 79-89 - Dipti Kapoor Sarmah, Anand J. Kulkarni:

Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography. 90-106 - Daniel Schatz, Rabih Bashroush:

Security predictions - A way to reduce uncertainty. 107-116 - Bhaskar Mondal

, Shrey Singh, Prabhakar Kumar:
A secure image encryption scheme based on cellular automata and chaotic skew tent map. 117-130 - Fatemeh Nazerian

, Homayun Motameni, Hossein Nematzadeh
:
Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy. 131-142 - Youssef Harmouch, Rachid El Kouch:

The benefit of using chaos in key schedule algorithm. 143-155
- Mohammed Alshahrani, Issa Traoré:

Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. 156-175

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














